INFO: task kworker/0:1:11 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:1 state:D stack:0 pid:11 tgid:11 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df845d84 r8:00000002 r7:60000113 r6:df845d8c r5:83238000 r4:83238000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83238000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df845e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a3c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83238000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85652b8c r4:85652800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85652b8c r4:830b8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83238000 r8:830b85ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830b8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8580 r8:80287e08 r7:df83de60 r6:830b8680 r5:83238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf845fb0 to 0xdf845ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830b5940 INFO: task kworker/0:1:11 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bc598000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:0:23 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:D stack:0 pid:23 tgid:23 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df879d84 r8:00000002 r7:60000113 r6:df879d8c r5:83242400 r4:83242400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83242400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df879e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83242400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4d78c r4:85c4d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4d78c r4:830cc080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83242400 r8:830cc0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830cc080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc080 r8:80287e08 r7:df819d50 r6:830cc100 r5:83242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf879fb0 to 0xdf879ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830cb100 INFO: task kworker/1:0:23 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bcd94000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/0:3:3052 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:3 state:D stack:0 pid:3052 tgid:3052 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec6e5d84 r8:00000002 r7:60000113 r6:ec6e5d8c r5:83b13000 r4:83b13000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b13000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec6e5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b13000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9df000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504bb8c r4:8504b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504bb8c r4:8473e300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b13000 r8:8473e32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473e300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473e300 r8:80287e08 r7:df83de60 r6:8473e380 r5:83b13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec6e5fb0 to 0xec6e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8471e6c0 INFO: task kworker/0:3:3052 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bd6e2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:3:3118 blocked for more than 450 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:3 state:D stack:0 pid:3118 tgid:3118 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df95dd84 r8:00000002 r7:60000013 r6:df95dd8c r5:83ac8c00 r4:83ac8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83ac8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df95de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83ac8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df977000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad778c r4:84ad7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ad778c r4:8473df80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83ac8c00 r8:8473dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473df80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473df80 r8:80287e08 r7:ead2de60 r6:8473d900 r5:83ac8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf95dfb0 to 0xdf95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847eeac0 INFO: task kworker/1:3:3118 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: be361000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:5:3122 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:5 state:D stack:0 pid:3122 tgid:3122 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9bdd84 r8:00000002 r7:60000113 r6:df9bdd8c r5:841ab000 r4:841ab000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ab000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b07c00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:841ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad6b8c r4:84ad6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ad6b8c r4:8473d700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ab000 r8:8473d72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d700 r8:80287e08 r7:df95de60 r6:8473d080 r5:841ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9bdfb0 to 0xdf9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847eed80 INFO: task kworker/1:5:3122 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/0:0:3123 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0 state:D stack:0 pid:3123 tgid:3123 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c1d84 r8:00000002 r7:60000113 r6:df9c1d8c r5:83b16000 r4:83b16000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b16000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b16000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504b78c r4:8504b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504b78c r4:8473e980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b16000 r8:8473e9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473e980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473e980 r8:80287e08 r7:ec6e5e60 r6:8473ec00 r5:83b16000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c1fb0 to 0xdf9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8473f2c0 INFO: task kworker/0:0:3123 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:6:3126 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:6 state:D stack:0 pid:3126 tgid:3126 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d5d84 r8:00000002 r7:60000113 r6:df9d5d8c r5:83b11800 r4:83b11800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b11800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b288c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b11800 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509af8c r4:8509ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509af8c r4:8473d580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b11800 r8:8473d5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d580 r8:80287e08 r7:df95de60 r6:8473eb00 r5:83b11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d5fb0 to 0xdf9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a080 INFO: task kworker/1:6:3126 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/1:7:3127 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:7 state:D stack:0 pid:3127 tgid:3127 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d9d84 r8:00000002 r7:60000113 r6:df9d9d8c r5:83b15400 r4:83b15400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b15400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beec40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b15400 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f5f8c r4:850f5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f5f8c r4:8473d680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b15400 r8:8473d6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d680 r8:80287e08 r7:df9d5e60 r6:8473eb80 r5:83b15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d9fb0 to 0xdf9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a080 INFO: task kworker/1:7:3127 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/0:4:3130 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:4 state:D stack:0 pid:3130 tgid:3130 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9d1d84 r8:00000002 r7:60000013 r6:df9d1d8c r5:83b10000 r4:83b10000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b10000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483e380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b10000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84954b8c r4:84954800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84954b8c r4:8473ec80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b10000 r8:8473ecac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ec80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ec80 r8:80287e08 r7:ec6e5e60 r6:8473ed00 r5:83b10000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9d1fb0 to 0xdf9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483e2c0 INFO: task kworker/0:4:3130 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 INFO: task kworker/0:5:3132 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:5 state:D stack:0 pid:3132 tgid:3132 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9c9d84 r8:00000002 r7:60000113 r6:df9c9d8c r5:83b12400 r4:83b12400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b12400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558ac80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b12400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df915000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ca38c r4:857ca000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857ca38c r4:8473ed80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b12400 r8:8473edac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ed80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ed80 r8:80287e08 r7:df9d1e60 r6:8473ee00 r5:83b12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9c9fb0 to 0xdf9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483e400 INFO: task kworker/0:5:3132 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:8:3134 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:8 state:D stack:0 pid:3134 tgid:3134 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa09d84 r8:00000002 r7:60000113 r6:dfa09d8c r5:83236000 r4:83236000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83236000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa09e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fd880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83236000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515cb8c r4:8515c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515cb8c r4:8473d600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83236000 r8:8473d62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d600 r8:80287e08 r7:df9d9e60 r6:8473ee80 r5:83236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa09fb0 to 0xdfa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a640 INFO: task kworker/1:8:3134 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:6:3136 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:6 state:D stack:0 pid:3136 tgid:3136 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa0dd84 r8:00000002 r7:60000013 r6:dfa0dd8c r5:844a0000 r4:844a0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa0de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdcf00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a0000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85075f8c r4:85075c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85075f8c r4:8473ef00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0000 r8:8473ef2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8473ef00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ef00 r8:80287e08 r7:df9c9e60 r6:8473ef80 r5:844a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa0dfb0 to 0xdfa0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483e700 INFO: task kworker/0:6:3136 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:9:3139 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:9 state:D stack:0 pid:3139 tgid:3139 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa25d84 r8:00000002 r7:60000113 r6:dfa25d8c r5:844a2400 r4:844a2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa25e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332f80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a2400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515f38c r4:8515f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515f38c r4:8473d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a2400 r8:8473d42c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d400 r8:80287e08 r7:dfa09e60 r6:8473ea00 r5:844a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa25fb0 to 0xdfa25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a780 INFO: task kworker/1:9:3139 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:10:3140 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:10 state:D stack:0 pid:3140 tgid:3140 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa29d84 r8:00000002 r7:60000113 r6:dfa29d8c r5:844a3c00 r4:844a3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa29e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85338ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528db8c r4:8528d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8528db8c r4:8473d180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a3c00 r8:8473d1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d180 r8:80287e08 r7:dfa25e60 r6:8473e880 r5:844a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa29fb0 to 0xdfa29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a780 INFO: task kworker/1:10:3140 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:11:3142 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:11 state:D stack:0 pid:3142 tgid:3142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa35d84 r8:00000002 r7:60000113 r6:dfa35d8c r5:844a0c00 r4:844a0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa35e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85449bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84470b8c r4:84470800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84470b8c r4:8473d500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a0c00 r8:8473d52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473d500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473d500 r8:80287e08 r7:dfa25e60 r6:8473e900 r5:844a0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa35fb0 to 0xdfa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a8c0 INFO: task kworker/1:11:3142 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bed5f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:12:3144 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:12 state:D stack:0 pid:3144 tgid:3144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa49d84 r8:00000002 r7:60000113 r6:dfa49d8c r5:844a4800 r4:844a4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa49e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538b740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a4800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea92b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84463f8c r4:84463c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84463f8c r4:8473de00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a4800 r8:8473de2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473de00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473de00 r8:80287e08 r7:dfa35e60 r6:8473e700 r5:844a4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa49fb0 to 0xdfa49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483aa00 INFO: task kworker/1:12:3144 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:13:3147 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:13 state:D stack:0 pid:3147 tgid:3147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa55d84 r8:00000002 r7:60000113 r6:dfa55d8c r5:844a6000 r4:844a6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa55e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e048e000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532d78c r4:8532d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532d78c r4:8473dc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6000 r8:8473dcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473dc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473dc80 r8:80287e08 r7:dfa35e60 r6:8473e780 r5:844a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa55fb0 to 0xdfa55ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483ac40 INFO: task kworker/1:13:3147 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:7:3148 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:7 state:D stack:0 pid:3148 tgid:3148 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa59d84 r8:00000002 r7:60000113 r6:dfa59d8c r5:844a6c00 r4:844a6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa59e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559dd00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:844a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df83b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653b8c r4:85653800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85653b8c r4:84361e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a6c00 r8:84361e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84361e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84361e00 r8:80287e08 r7:df9c9e60 r6:838bf480 r5:844a6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa59fb0 to 0xdfa59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483ee80 INFO: task kworker/0:7:3148 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:14:3149 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:14 state:D stack:0 pid:3149 tgid:3149 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa61d84 r8:00000002 r7:60000013 r6:dfa61d8c r5:844a5400 r4:844a5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:844a5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa61e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c0680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:844a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532f38c r4:8532f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532f38c r4:8473db80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:844a5400 r8:8473dbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473db80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473db80 r8:80287e08 r7:dfa55e60 r6:83c74e00 r5:844a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa61fb0 to 0xdfa61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483af80 INFO: task kworker/1:14:3149 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:15:3151 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:15 state:D stack:0 pid:3151 tgid:3151 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa69d84 r8:00000002 r7:60000113 r6:dfa69d8c r5:833a9800 r4:833a9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:833a9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa69e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560c100 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:833a9800 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb237000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84471f8c r4:84471c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84471f8c r4:8473de80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:833a9800 r8:8473deac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473de80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473de80 r8:80287e08 r7:dfa61e60 r6:83c74d80 r5:833a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa69fb0 to 0xdfa69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483ae00 INFO: task kworker/1:15:3151 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:16:3153 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:16 state:D stack:0 pid:3153 tgid:3153 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa79d84 r8:00000002 r7:60000013 r6:dfa79d8c r5:8409ec00 r4:8409ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8409ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa79e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dbc00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8409ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547eb8c r4:8547e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547eb8c r4:8473df00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8409ec00 r8:8473df2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473df00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473df00 r8:80287e08 r7:dfa69e60 r6:83c74b80 r5:8409ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa79fb0 to 0xdfa79ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483af40 INFO: task kworker/1:16:3153 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:17:3155 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:17 state:D stack:0 pid:3155 tgid:3155 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa8dd84 r8:00000002 r7:60000013 r6:dfa8dd8c r5:84098000 r4:84098000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84098000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa8de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84098000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa37000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532fb8c r4:8532f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532fb8c r4:830b8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84098000 r8:830b84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8480 r8:80287e08 r7:dfa69e60 r6:83c74a80 r5:84098000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa8dfb0 to 0xdfa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28100 INFO: task kworker/1:17:3155 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:18:3157 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:18 state:D stack:0 pid:3157 tgid:3157 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa91d84 r8:00000002 r7:60000113 r6:dfa91d8c r5:8409b000 r4:8409b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8409b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa91e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85668a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8409b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447238c r4:84472000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447238c r4:830b8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8409b000 r8:830b842c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:830b8400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830b8400 r8:80287e08 r7:dfa69e60 r6:830cc400 r5:8409b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa91fb0 to 0xdfa91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28100 INFO: task kworker/1:18:3157 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:19:3160 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:19 state:D stack:0 pid:3160 tgid:3160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa1d84 r8:00000002 r7:60000113 r6:dfaa1d8c r5:84098c00 r4:84098c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84098c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84098c00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85643f8c r4:85643c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85643f8c r4:8336df80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84098c00 r8:8336dfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8336df80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8336df80 r8:80287e08 r7:dfa91e60 r6:830cc380 r5:84098c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa1fb0 to 0xdfaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a280c0 INFO: task kworker/1:19:3160 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:20:3162 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:20 state:D stack:0 pid:3162 tgid:3162 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaa9d84 r8:00000002 r7:60000113 r6:dfaa9d8c r5:840b8c00 r4:840b8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840b8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaa9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae1500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ba5b8c r4:85ba5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85ba5b8c r4:8473ea80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840b8c00 r8:8473eaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8473ea80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8473ea80 r8:80287e08 r7:dfaa1e60 r6:84063680 r5:840b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaa9fb0 to 0xdfaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28440 INFO: task kworker/1:20:3162 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:21:3163 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:21 state:D stack:0 pid:3163 tgid:3163 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfab5d84 r8:00000002 r7:60000113 r6:dfab5d8c r5:840b8000 r4:840b8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840b8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfab5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0571000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570278c r4:85702400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570278c r4:84146c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840b8000 r8:84146c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84146c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84146c00 r8:80287e08 r7:dfaa9e60 r6:84063600 r5:840b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfab5fb0 to 0xdfab5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28580 INFO: task kworker/1:21:3163 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:22:3167 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:22 state:D stack:0 pid:3167 tgid:3167 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df9f9d84 r8:00000002 r7:60000113 r6:df9f9d8c r5:840bc800 r4:840bc800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840bc800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df9f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c3900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:840bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfac7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857f0b8c r4:857f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857f0b8c r4:832a0280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840bc800 r8:832a02ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0280 r8:80287e08 r7:dfaa9e60 r6:83351600 r5:840bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf9f9fb0 to 0xdf9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28680 INFO: task kworker/1:22:3167 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:8:3169 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:8 state:D stack:0 pid:3169 tgid:3169 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:df981d84 r8:00000002 r7:60000013 r6:df981d8c r5:840ba400 r4:840ba400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840ba400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:df981e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543d040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaed9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84955b8c r4:84955800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84955b8c r4:83351580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840ba400 r8:833515ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:83351580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:83351580 r8:80287e08 r7:df9c9e60 r6:83c9c400 r5:840ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdf981fb0 to 0xdf981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c200 INFO: task kworker/0:8:3169 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:9:3171 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:9 state:D stack:0 pid:3171 tgid:3171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfabdd84 r8:00000002 r7:60000113 r6:dfabdd8c r5:840bec00 r4:840bec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840bec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfabde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85595a00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576678c r4:85766400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576678c r4:846cdb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840bec00 r8:846cdb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:846cdb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:846cdb00 r8:80287e08 r7:df981e60 r6:846cdd80 r5:840bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfabdfb0 to 0xdfabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c6c0 INFO: task kworker/0:9:3171 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:10:3173 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:10 state:D stack:0 pid:3173 tgid:3173 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad1d84 r8:00000002 r7:60000113 r6:dfad1d8c r5:840bd400 r4:840bd400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840bd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539c280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb223000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85855f8c r4:85855c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85855f8c r4:8485f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840bd400 r8:8485f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f000 r8:80287e08 r7:df981e60 r6:8485f080 r5:840bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad1fb0 to 0xdfad1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c4c0 INFO: task kworker/0:10:3173 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:11:3175 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:11 state:D stack:0 pid:3175 tgid:3175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa81d84 r8:00000002 r7:60000113 r6:dfa81d8c r5:840bb000 r4:840bb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:840bb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b0200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:840bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84955f8c r4:84955c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84955f8c r4:8485f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:840bb000 r8:8485f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f100 r8:80287e08 r7:dfad1e60 r6:8485f180 r5:840bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa81fb0 to 0xdfa81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c640 INFO: task kworker/0:11:3175 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:12:3177 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:12 state:D stack:0 pid:3177 tgid:3177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfae5d84 r8:00000002 r7:60000113 r6:dfae5d8c r5:84486000 r4:84486000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84486000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfae5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8545bf40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84486000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8585578c r4:85855400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8585578c r4:8485f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84486000 r8:8485f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f200 r8:80287e08 r7:dfad1e60 r6:8485f280 r5:84486000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfae5fb0 to 0xdfae5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2ca00 INFO: task kworker/0:12:3177 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:13:3180 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:13 state:D stack:0 pid:3180 tgid:3180 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfad9d84 r8:00000002 r7:60000113 r6:dfad9d8c r5:84480000 r4:84480000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84480000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfad9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852f2e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84480000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85856b8c r4:85856800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85856b8c r4:8485f300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84480000 r8:8485f32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f300 r8:80287e08 r7:dfad1e60 r6:8485f380 r5:84480000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfad9fb0 to 0xdfad9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2ccc0 INFO: task kworker/0:13:3180 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:14:3181 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:14 state:D stack:0 pid:3181 tgid:3181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaedd84 r8:00000002 r7:60000113 r6:dfaedd8c r5:84485400 r4:84485400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84485400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bfb480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84485400 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec989000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84956b8c r4:84956800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84956b8c r4:8485f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84485400 r8:8485f42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f400 r8:80287e08 r7:dfad9e60 r6:8485f480 r5:84485400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaedfb0 to 0xdfaedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2ccc0 INFO: task kworker/0:14:3181 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:23:3182 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:23 state:D stack:0 pid:3182 tgid:3182 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfaf9d84 r8:00000002 r7:60000113 r6:dfaf9d8c r5:83b1bc00 r4:83b1bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfaf9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e4780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b1bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85af1b8c r4:85af1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85af1b8c r4:832a0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1bc00 r8:832a012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:832a0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:832a0100 r8:80287e08 r7:dfaa9e60 r6:8485f500 r5:83b1bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfaf9fb0 to 0xdfaf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28cc0 INFO: task kworker/1:23:3182 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:15:3185 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:15 state:D stack:0 pid:3185 tgid:3185 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb01d84 r8:00000002 r7:60000113 r6:dfb01d8c r5:83b1a400 r4:83b1a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2f940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecdb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495778c r4:84957400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495778c r4:8485f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1a400 r8:8485f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f580 r8:80287e08 r7:dfaede60 r6:8485f600 r5:83b1a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb01fb0 to 0xdfb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744280 INFO: task kworker/0:15:3185 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:16:3187 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:16 state:D stack:0 pid:3187 tgid:3187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb0dd84 r8:00000002 r7:60000113 r6:dfb0dd8c r5:83b1b000 r4:83b1b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb0de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c32c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1b000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85974f8c r4:85974c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85974f8c r4:8485f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1b000 r8:8485f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f680 r8:80287e08 r7:dfb01e60 r6:8485f700 r5:83b1b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb0dfb0 to 0xdfb0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744440 INFO: task kworker/0:16:3187 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:17:3189 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:17 state:D stack:0 pid:3189 tgid:3189 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb15d84 r8:00000002 r7:60000113 r6:dfb15d8c r5:83b1c800 r4:83b1c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb15e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab16c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1c800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec8dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84957b8c r4:84957800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84957b8c r4:8485f780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1c800 r8:8485f7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f780 r8:80287e08 r7:dfb0de60 r6:8485f800 r5:83b1c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb15fb0 to 0xdfb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847442c0 INFO: task kworker/0:17:3189 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:18:3192 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:18 state:D stack:0 pid:3192 tgid:3192 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb21d84 r8:00000002 r7:60000113 r6:dfb21d8c r5:83b1e000 r4:83b1e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b1e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb21e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85438fc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b1e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597578c r4:85975400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597578c r4:8485f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b1e000 r8:8485f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f880 r8:80287e08 r7:dfb0de60 r6:8485f900 r5:83b1e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb21fb0 to 0xdfb21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847443c0 INFO: task kworker/0:18:3192 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:19:3193 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:19 state:D stack:0 pid:3193 tgid:3193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb35d84 r8:00000002 r7:60000113 r6:dfb35d8c r5:83af0c00 r4:83af0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83af0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb35e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83c922c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb79d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8597738c r4:85977000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8597738c r4:8485f980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83af0c00 r8:8485f9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485f980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485f980 r8:80287e08 r7:dfb21e60 r6:8485fa00 r5:83af0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb35fb0 to 0xdfb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744540 INFO: task kworker/0:19:3193 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:20:3195 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:20 state:D stack:0 pid:3195 tgid:3195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb29d84 r8:00000002 r7:60000113 r6:dfb29d8c r5:83b21800 r4:83b21800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b21800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb29e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854df580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b21800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac4b8c r4:85ac4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ac4b8c r4:8485fa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b21800 r8:8485faac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fa80 r8:80287e08 r7:dfb35e60 r6:8485fb00 r5:83b21800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb29fb0 to 0xdfb29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744780 INFO: task kworker/0:20:3195 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:21:3198 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:21 state:D stack:0 pid:3198 tgid:3198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb4dd84 r8:00000002 r7:60000113 r6:dfb4dd8c r5:84199800 r4:84199800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84199800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb4de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85435300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84199800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ac5f8c r4:85ac5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ac5f8c r4:8485fb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84199800 r8:8485fbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fb80 r8:80287e08 r7:dfb29e60 r6:8485fc00 r5:84199800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb4dfb0 to 0xdfb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744840 INFO: task kworker/0:21:3198 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:22:3200 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:22 state:D stack:0 pid:3200 tgid:3200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb5dd84 r8:00000002 r7:60000113 r6:dfb5dd8c r5:841ac800 r4:841ac800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ac800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb5de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8472dd80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecb85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8499d38c r4:8499d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8499d38c r4:8485fc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ac800 r8:8485fcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fc80 r8:80287e08 r7:dfb4de60 r6:84569700 r5:841ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb5dfb0 to 0xdfb5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744c80 INFO: task kworker/0:22:3200 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: bf142000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:23:3202 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:23 state:D stack:0 pid:3202 tgid:3202 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb51d84 r8:00000002 r7:60000113 r6:dfb51d8c r5:841a8c00 r4:841a8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841a8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb51e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854542c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f16f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ecf79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c7df8c r4:85c7dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7df8c r4:8485fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841a8c00 r8:8485fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fd00 r8:80287e08 r7:dfb5de60 r6:84569780 r5:841a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb51fb0 to 0xdfb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744b80 INFO: task kworker/0:23:3202 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c283b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:24:3205 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:24 state:D stack:0 pid:3205 tgid:3205 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb71d84 r8:00000002 r7:60000113 r6:dfb71d8c r5:841a8000 r4:841a8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841a8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb71e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423100 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed515000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bf8f8c r4:85bf8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bf8f8c r4:8485fd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841a8000 r8:8485fdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fd80 r8:80287e08 r7:dfb51e60 r6:8427fb00 r5:841a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb71fb0 to 0xdfb71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744dc0 INFO: task kworker/0:24:3205 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c283b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:25:3208 blocked for more than 451 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:25 state:D stack:0 pid:3208 tgid:3208 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb81d84 r8:00000002 r7:60000013 r6:dfb81d8c r5:841aa400 r4:841aa400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841aa400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85423ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec789000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bfa78c r4:85bfa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bfa78c r4:8485fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841aa400 r8:8485fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fe00 r8:80287e08 r7:dfb51e60 r6:8475cd00 r5:841aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb81fb0 to 0xdfb81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6100 INFO: task kworker/0:25:3208 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c2d47000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:26:3210 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:26 state:D stack:0 pid:3210 tgid:3210 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb8dd84 r8:00000002 r7:60000113 r6:dfb8dd8c r5:83393c00 r4:83393c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83393c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb8de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85453840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83393c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed68d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85bfbb8c r4:85bfb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85bfbb8c r4:8485fe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83393c00 r8:8485feac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485fe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485fe80 r8:80287e08 r7:dfb51e60 r6:8477b000 r5:83393c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb8dfb0 to 0xdfb8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa60c0 INFO: task kworker/0:26:3210 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c2ff2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:25:3211 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:25 state:D stack:0 pid:3211 tgid:3211 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb91d84 r8:00000002 r7:60000013 r6:dfb91d8c r5:832eb000 r4:832eb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:832eb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb91e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:832eb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4d38c r4:85c4d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4d38c r4:8477b080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:832eb000 r8:8477b0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8477b080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477b080 r8:80287e08 r7:dfb3de60 r6:8477b100 r5:832eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb91fb0 to 0xdfb91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84715400 INFO: task kworker/1:25:3211 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c33fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:27:3213 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:27 state:D stack:0 pid:3213 tgid:3213 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb65d84 r8:00000002 r7:60000113 r6:dfb65d8c r5:84198000 r4:84198000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84198000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb65e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d4340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84198000 r7:00000000 r6:83018000 r5:00001000 r4:7f131000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed87f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6cf8c r4:85c6cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6cf8c r4:8485ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84198000 r8:8485ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8485ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8485ff00 r8:80287e08 r7:dfb51e60 r6:8485ff80 r5:84198000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb65fb0 to 0xdfb65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6300 INFO: task kworker/0:27:3213 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c35c6000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:28:3215 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:28 state:D stack:0 pid:3215 tgid:3215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfba5d84 r8:00000002 r7:60000113 r6:dfba5d8c r5:8419c800 r4:8419c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8419c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfba5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d4ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8419c800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed071000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c6f78c r4:85c6f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c6f78c r4:8471f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8419c800 r8:8471f02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f000 r8:80287e08 r7:dfb51e60 r6:8471f080 r5:8419c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfba5fb0 to 0xdfba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa63c0 INFO: task kworker/0:28:3215 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c367e000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:29:3216 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:29 state:D stack:0 pid:3216 tgid:3216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfb89d84 r8:00000002 r7:60000113 r6:dfb89d8c r5:8419e000 r4:8419e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8419e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfb89e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853428c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8419e000 r7:00000000 r6:83018000 r5:00001000 r4:7f235000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85d46b8c r4:85d46800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85d46b8c r4:8471f100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8419e000 r8:8471f12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f100 r8:80287e08 r7:dfb51e60 r6:8471f180 r5:8419e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfb89fb0 to 0xdfb89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa63c0 INFO: task kworker/0:29:3216 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c39fd000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:30:3219 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:30 state:D stack:0 pid:3219 tgid:3219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb1d84 r8:00000002 r7:60000113 r6:dfbb1d8c r5:8419bc00 r4:8419bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8419bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:83aa6300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8419bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f1c5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed99b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c7e78c r4:85c7e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7e78c r4:8471f200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8419bc00 r8:8471f22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f200 r8:80287e08 r7:dfb89e60 r6:8471f280 r5:8419bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb1fb0 to 0xdfbb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6780 INFO: task kworker/0:30:3219 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c39fd000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:31:3221 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:31 state:D stack:0 pid:3221 tgid:3221 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbc5d84 r8:00000002 r7:60000113 r6:dfbc5d8c r5:84198c00 r4:84198c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84198c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbc5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be0500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84198c00 r7:00000000 r6:83018000 r5:00001000 r4:7f217000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eda83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c7f78c r4:85c7f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c7f78c r4:8471f380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84198c00 r8:8471f3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f380 r8:80287e08 r7:dfb89e60 r6:8471f400 r5:84198c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbc5fb0 to 0xdfbc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6b40 INFO: task kworker/0:31:3221 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c3a85000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:32:3223 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:32 state:D stack:0 pid:3223 tgid:3223 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbb9d84 r8:00000002 r7:60000113 r6:dfbb9d8c r5:83b0b000 r4:83b0b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbb9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b0b000 r7:00000000 r6:83018000 r5:00001000 r4:7f2bb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9df8c r4:85c9dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9df8c r4:8471f480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0b000 r8:8471f4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f480 r8:80287e08 r7:dfb89e60 r6:8471f500 r5:83b0b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbb9fb0 to 0xdfbb9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6c40 INFO: task kworker/0:32:3223 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c3dd3000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:33:3225 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:33 state:D stack:0 pid:3225 tgid:3225 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbd9d84 r8:00000002 r7:60000113 r6:dfbd9d8c r5:83b0c800 r4:83b0c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b0c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbd9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e3380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b0c800 r7:00000000 r6:83018000 r5:00001000 r4:7f217000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8499fb8c r4:8499f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8499fb8c r4:8471f580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b0c800 r8:8471f5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f580 r8:80287e08 r7:dfbb9e60 r6:8471f600 r5:83b0c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbd9fb0 to 0xdfbd9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6b80 INFO: task kworker/0:33:3225 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c3f81000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:34:3227 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:34 state:D stack:0 pid:3227 tgid:3227 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbe9d84 r8:00000002 r7:60000113 r6:dfbe9d8c r5:83878c00 r4:83878c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83878c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbe9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852068c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9d38c r4:85c9d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9d38c r4:8471f680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83878c00 r8:8471f6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f680 r8:80287e08 r7:dfbb9e60 r6:8471f700 r5:83878c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbe9fb0 to 0xdfbe9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83aa6e40 INFO: task kworker/0:34:3227 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c3f81000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:26:3229 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:26 state:D stack:0 pid:3229 tgid:3229 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf1d84 r8:00000002 r7:60000013 r6:dfbf1d8c r5:8387ec00 r4:8387ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8387ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4db8c r4:85c4d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4db8c r4:8477b180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387ec00 r8:8477b1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8477b180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477b180 r8:80287e08 r7:dfb3de60 r6:8471f780 r5:8387ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf1fb0 to 0xdfbf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84715a00 INFO: task kworker/1:26:3229 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c4225000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:35:3230 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:35 state:D stack:0 pid:3230 tgid:3230 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbcdd84 r8:00000002 r7:60000113 r6:dfbcdd8c r5:83b2a400 r4:83b2a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbcde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852066c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b2a400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9cb8c r4:85c9c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9cb8c r4:8471f800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2a400 r8:8471f82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f800 r8:80287e08 r7:dfbe9e60 r6:8477b200 r5:83b2a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbcdfb0 to 0xdfbcdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84744980 INFO: task kworker/0:35:3230 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c4280000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:36:3233 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:36 state:D stack:0 pid:3233 tgid:3233 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc0dd84 r8:00000002 r7:60000113 r6:dfc0dd8c r5:83b2ec00 r4:83b2ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc0de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b2ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f2b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9d78c r4:85c9d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9d78c r4:8471f880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2ec00 r8:8471f8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f880 r8:80287e08 r7:dfbe9e60 r6:8477b280 r5:83b2ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc0dfb0 to 0xdfc0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947100 INFO: task kworker/0:36:3233 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c44fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:37:3234 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:37 state:D stack:0 pid:3234 tgid:3234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbedd84 r8:00000002 r7:60000113 r6:dfbedd8c r5:8387a400 r4:8387a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387a400 r7:00000000 r6:83018000 r5:00001000 r4:7f2b9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9db8c r4:85c9d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9db8c r4:8471f900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387a400 r8:8471f92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471f900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471f900 r8:80287e08 r7:dfc0de60 r6:8471f980 r5:8387a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbedfb0 to 0xdfbedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849473c0 INFO: task kworker/0:37:3234 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c44fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:38:3238 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:38 state:D stack:0 pid:3238 tgid:3238 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc05d84 r8:00000002 r7:60000113 r6:dfc05d8c r5:8387c800 r4:8387c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8387c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc05e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8387c800 r7:00000000 r6:83018000 r5:00001000 r4:7f2ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9bf8c r4:85c9bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9bf8c r4:8471fa00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8387c800 r8:8471fa2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fa00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fa00 r8:80287e08 r7:dfc0de60 r6:8471fa80 r5:8387c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc05fb0 to 0xdfc05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947340 INFO: task kworker/0:38:3238 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c48c4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:39:3239 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:39 state:D stack:0 pid:3239 tgid:3239 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfbf9d84 r8:00000002 r7:60000113 r6:dfbf9d8c r5:83b08c00 r4:83b08c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b08c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfbf9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206c80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b08c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2bd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9e38c r4:85c9e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9e38c r4:8471fb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b08c00 r8:8471fb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fb00 r8:80287e08 r7:dfc05e60 r6:8471fb80 r5:83b08c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfbf9fb0 to 0xdfbf9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947340 INFO: task kworker/0:39:3239 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c4a86000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:40:3241 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:40 state:D stack:0 pid:3241 tgid:3241 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa11d84 r8:00000002 r7:60000113 r6:dfa11d8c r5:83b08000 r4:83b08000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b08000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa11e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b08000 r7:00000000 r6:83018000 r5:00001000 r4:7f2b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9cf8c r4:85c9cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9cf8c r4:8471fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b08000 r8:8471fc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fc00 r8:80287e08 r7:dfbf9e60 r6:8471fc80 r5:83b08000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa11fb0 to 0xdfa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849476c0 INFO: task kworker/0:40:3241 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c50bf000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:41:3243 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:41 state:D stack:0 pid:3243 tgid:3243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa41d84 r8:00000002 r7:60000113 r6:dfa41d8c r5:83af2400 r4:83af2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83af2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa41e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83af2400 r7:00000000 r6:83018000 r5:00001000 r4:7f2af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9c78c r4:85c9c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9c78c r4:8471fd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83af2400 r8:8471fd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fd00 r8:80287e08 r7:dfbf9e60 r6:8471fd80 r5:83af2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa41fb0 to 0xdfa41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947ac0 INFO: task kworker/0:41:3243 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5542000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:42:3245 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:42 state:D stack:0 pid:3245 tgid:3245 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc15d84 r8:00000002 r7:60000113 r6:dfc15d8c r5:84870000 r4:84870000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84870000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc15e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84870000 r7:00000000 r6:83018000 r5:00001000 r4:7f2ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9c38c r4:85c9c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9c38c r4:8471fe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84870000 r8:8471fe2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471fe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471fe00 r8:80287e08 r7:dfa41e60 r6:8471fe80 r5:84870000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc15fb0 to 0xdfc15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947940 INFO: task kworker/0:42:3245 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5542000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:43:3247 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:43 state:D stack:0 pid:3247 tgid:3247 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc19d84 r8:00000002 r7:60000113 r6:dfc19d8c r5:84870c00 r4:84870c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84870c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc19e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84870c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edc55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9bb8c r4:85c9b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9bb8c r4:8471ff00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84870c00 r8:8471ff2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8471ff00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8471ff00 r8:80287e08 r7:dfc15e60 r6:8471ff80 r5:84870c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc19fb0 to 0xdfc19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947d00 INFO: task kworker/0:43:3247 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5542000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:44:3249 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:44 state:D stack:0 pid:3249 tgid:3249 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc1dd84 r8:00000002 r7:60000113 r6:dfc1dd8c r5:84871800 r4:84871800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84871800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc1de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206cc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84871800 r7:00000000 r6:83018000 r5:00001000 r4:7f2bf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9e78c r4:85c9e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9e78c r4:8499a000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84871800 r8:8499a02c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a000 r8:80287e08 r7:dfc19e60 r6:8499a080 r5:84871800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc1dfb0 to 0xdfc1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947c80 INFO: task kworker/0:44:3249 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5e90000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:45:3250 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:45 state:D stack:0 pid:3250 tgid:3250 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfa2dd84 r8:00000002 r7:60000113 r6:dfa2dd8c r5:84873000 r4:84873000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84873000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfa2de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85206ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84873000 r7:00000000 r6:83018000 r5:00001000 r4:7f2c1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edcc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9eb8c r4:85c9e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9eb8c r4:8499a100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84873000 r8:8499a12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a100 r8:80287e08 r7:dfc1de60 r6:8499a180 r5:84873000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfa2dfb0 to 0xdfa2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84947d80 INFO: task kworker/0:45:3250 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c5e90000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:46:3253 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:46 state:D stack:0 pid:3253 tgid:3253 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc21d84 r8:00000002 r7:60000113 r6:dfc21d8c r5:84873c00 r4:84873c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84873c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc21e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84873c00 r7:00000000 r6:83018000 r5:00001000 r4:7f265000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed307000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9ef8c r4:85c9ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9ef8c r4:8499a200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84873c00 r8:8499a22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a200 r8:80287e08 r7:dfa2de60 r6:8499a280 r5:84873c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc21fb0 to 0xdfc21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54280 INFO: task kworker/0:46:3253 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c661c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:47:3255 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:47 state:D stack:0 pid:3255 tgid:3255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc29d84 r8:00000002 r7:60000113 r6:dfc29d8c r5:84875400 r4:84875400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84875400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc29e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84875400 r7:00000000 r6:83018000 r5:00001000 r4:7f267000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed547000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9f38c r4:85c9f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9f38c r4:8499a300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84875400 r8:8499a32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a300 r8:80287e08 r7:dfc21e60 r6:8499a380 r5:84875400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc29fb0 to 0xdfc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54200 INFO: task kworker/0:47:3255 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c661c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:27:3258 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:27 state:D stack:0 pid:3258 tgid:3258 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc25d84 r8:00000002 r7:60000013 r6:dfc25d8c r5:83b2c800 r4:83b2c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b2c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc25e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85085700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83b2c800 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c4e38c r4:85c4e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85c4e38c r4:8477b300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b2c800 r8:8477b32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8477b300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8477b300 r8:80287e08 r7:dfb3de60 r6:8477b380 r5:83b2c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc25fb0 to 0xdfc25ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847ee780 INFO: task kworker/1:27:3258 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c661c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:48:3259 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:48 state:D stack:0 pid:3259 tgid:3259 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc2dd84 r8:00000002 r7:60000113 r6:dfc2dd8c r5:83b29800 r4:83b29800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83b29800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc2de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83b29800 r7:00000000 r6:83018000 r5:00001000 r4:7f2cb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed8ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9ff8c r4:85c9fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9ff8c r4:8499a400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83b29800 r8:8499a42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a400 r8:80287e08 r7:dfc29e60 r6:8477b400 r5:83b29800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc2dfb0 to 0xdfc2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54580 INFO: task kworker/0:48:3259 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c6d6b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:49:3264 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:49 state:D stack:0 pid:3264 tgid:3264 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc3dd84 r8:00000002 r7:60000113 r6:dfc3dd8c r5:841ad400 r4:841ad400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:841ad400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc3de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:841ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f2c9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed879000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9fb8c r4:85c9f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9fb8c r4:8499a480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:841ad400 r8:8499a4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a480 r8:80287e08 r7:dfc2de60 r6:8477b580 r5:841ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc3dfb0 to 0xdfc3dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54780 INFO: task kworker/0:49:3264 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c6d6b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:50:3266 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:50 state:D stack:0 pid:3266 tgid:3266 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc45d84 r8:00000002 r7:60000113 r6:dfc45d8c r5:83868c00 r4:83868c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83868c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc45e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c2c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83868c00 r7:00000000 r6:83018000 r5:00001000 r4:7f2c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed6b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85c9f78c r4:85c9f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85c9f78c r4:8499a500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83868c00 r8:8499a52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a500 r8:80287e08 r7:dfc3de60 r6:8477b600 r5:83868c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc45fb0 to 0xdfc45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54840 INFO: task kworker/0:50:3266 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c6d6b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:51:3268 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:51 state:D stack:0 pid:3268 tgid:3268 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc4dd84 r8:00000002 r7:60000113 r6:dfc4dd8c r5:83869800 r4:83869800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83869800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc4de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543ca00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83869800 r7:00000000 r6:83018000 r5:00001000 r4:7f2d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca0f8c r4:85ca0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca0f8c r4:8499a580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83869800 r8:8499a5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a580 r8:80287e08 r7:dfc45e60 r6:8477b680 r5:83869800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc4dfb0 to 0xdfc4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54980 INFO: task kworker/0:51:3268 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c71c4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:52:3269 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:52 state:D stack:0 pid:3269 tgid:3269 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc51d84 r8:00000002 r7:60000113 r6:dfc51d8c r5:8386e000 r4:8386e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc51e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c6c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8386e000 r7:00000000 r6:83018000 r5:00001000 r4:7f2cd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed987000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca038c r4:85ca0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca038c r4:8499a600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386e000 r8:8499a62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a600 r8:80287e08 r7:dfc4de60 r6:8477b700 r5:8386e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc51fb0 to 0xdfc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54980 INFO: task kworker/0:52:3269 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c74d7000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e0105dc0 r4:00000001 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:53:3271 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:53 state:D stack:0 pid:3271 tgid:3271 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc59d84 r8:00000002 r7:60000113 r6:dfc59d8c r5:8386b000 r4:8386b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8386b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc59e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543c800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8386b000 r7:00000000 r6:83018000 r5:00001000 r4:7f2cf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed993000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca078c r4:85ca0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca078c r4:8499a680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8386b000 r8:8499a6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a680 r8:80287e08 r7:dfc4de60 r6:8477b780 r5:8386b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc59fb0 to 0xdfc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54b40 INFO: task kworker/0:53:3271 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe0105d28 to 0xe0105d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc69e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54c80 INFO: task kworker/0:54:3273 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c794c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:55:3275 blocked for more than 452 seconds. r4:84921800 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca138c r4:85ca1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8499a780 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc71fb0 to 0xdfc71ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:83d54dc0 INFO: task kworker/0:55:3275 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c7c7d000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:56:3278 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:56 state:D stack:0 pid:3278 tgid:3278 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc81d84 r8:00000002 r7:60000013 r6:dfc81d8c r5:84922400 r4:84922400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84922400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543cc00 r9:83018005 r8:84922400 r7:00000000 r6:83018000 r5:00001000 r4:7f2d7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca178c r4:85ca1400 r7:dddced80 r6:83018000 r5:85ca178c r4:8499a800 r4:8499a800 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c7c7d000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:57:3280 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:57 state:D stack:0 pid:3280 tgid:3280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc89d84 r8:00000002 r7:60000113 r6:dfc89d8c r5:84923000 r4:84923000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84923000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc89e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543cd00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84923000 r7:00000000 r6:83018000 r5:00001000 r4:7f2d9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ed9e7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca1b8c r4:85ca1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca1b8c r4:8499a880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84923000 r8:8499a8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499a880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499a880 r8:80287e08 r7:dfc81e60 r6:8477b980 r5:84923000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfc89fb0 to 0xdfc89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aac1c0 INFO: task kworker/0:57:3280 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c804f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:58:3282 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:58 state:D stack:0 pid:3282 tgid:3282 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc6dd84 r8:00000002 r7:60000113 r6:dfc6dd8c r5:84876c00 r4:84876c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84876c00 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ed9f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca1f8c r4:85ca1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca1f8c r4:8499a900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84876c00 r8:8499a92c r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Exception stack(0xe0105d28 to 0xe0105d70) r4:00000000 r4:84aec980 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:84876000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543cf00 r5:85ca238c r4:85ca2000 r4:8499aa00 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 5d60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:60:3287 blocked for more than 452 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:60 state:D stack:0 pid:3287 tgid:3287 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfc95d84 r8:00000002 r7:60000113 r6:dfc95d8c r5:84874800 r4:84874800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84874800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfc95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543cfc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84874800 r7:00000000 r6:83018000 r5:00001000 r4:7f2df000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85ca278c r4:85ca2400 r4:8499ab00 r4:84aac5c0 Exception stack(0xe0105d28 to 0xe0105d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85ca378c r4:85ca3400 r10:00000000 r9:8499ac00 r8:80287e08 r7:dfc95e60 r6:8499ac80 r5:84872400 Call trace: r5:80050013 r4:80239bb0 r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:63:3292 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:63 state:D stack:0 pid:3292 tgid:3292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcc5d84 r8:00000002 r7:60000113 r6:dfcc5d8c r5:84939800 r4:84939800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84939800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcc5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab72c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84939800 r7:00000000 r6:83018000 r5:00001000 r4:7f2e5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85ca338c r4:85ca3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85ca338c r4:8499ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84939800 r8:8499ae2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8499ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8499ae00 r8:80287e08 r7:dfc9de60 r6:8499ae80 r5:84939800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdfcc5fb0 to 0xdfcc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aac980 INFO: task kworker/0:63:3292 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c86ef000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:64:3293 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:64 state:D stack:0 pid:3293 tgid:3293 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:dfcd1d84 r8:00000002 r7:60000013 r6:dfcd1d8c r5:8493a400 r4:8493a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8493a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcd1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ab7480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8493a400 r7:00000000 r6:83018000 r5:00001000 r4:7f2e9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:edb47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85ca3b8c r4:85ca3800 r10:61c88647 r9:8493a400 r8:8499af2c r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r4:82ac21e4 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 5fa0: 00000000 00000000 00000000 00000000 r5:84b6e000 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84ad6f8c r4:84ad6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:85 state:D stack:0 pid:3610 tgid:3610 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00c9d84 r8:00000002 r7:60000113 r6:e00c9d8c r5:84a35400 r4:84a35400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a35400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be2800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a35400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad738c r4:84ad7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ad738c r4:84afc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a35400 r8:84afc2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84afc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84afc280 r8:80287e08 r7:e000de60 r6:84afc300 r5:84a35400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00c9fb0 to 0xe00c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d69c0 INFO: task kworker/1:85:3610 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c8dfb000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:173:3630 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:173 state:D stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0431d84 r8:00000002 r7:60000113 r6:e0431d8c r5:84a4d400 r4:84a4d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a4d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0431e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 INFO: task kworker/0:173:3630 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: c8dfb000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:174:3633 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:174 state:D stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e043dd84 r8:00000002 r7:60000113 r6:e043dd8c r5:84a4b000 r4:84a4b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a4b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e043de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:e0445d84 r8:00000002 r7:60000113 r6:e0445d8c r5:84890000 r4:00000000 r9:83018005 r8:84890000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d9000 r5:84b4f78c r4:84b4f400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0105d28 to 0xe0105d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0105fb0 to 0xe0105ff8) INFO: task kworker/0:176:3636 blocked for more than 453 seconds. r5:84890c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b4fb8c r4:84b4f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aecd80 r8:80287e08 r7:e0445e60 r6:84aece00 r5:84890c00 INFO: task kworker/0:176:3636 is blocked on a mutex likely owned by task kworker/0:172:3628. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: ca473000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:177:3638 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:177 state:D stack:0 pid:3638 tgid:3638 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0459d84 r8:00000002 r7:60000113 r6:e0459d8c r5:84891800 r4:84891800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84891800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0459e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e840 r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b5838c r4:84b58000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aece80 r8:80287e08 r7:e0451e60 r6:84aecf00 r5:84891800 r4:84b0e4c0 Call trace: Exception stack(0xe0105d28 to 0xe0105d70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0105fb0 to 0xe0105ff8) INFO: task kworker/0:178:3640 blocked for more than 453 seconds. r4:84892400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e6c0 r5:84b4ff8c r4:84b4fc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:84aec980 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b58b8c r4:84b58800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b58b8c r4:84b16080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84893000 r8:84b160ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16080 r8:80287e08 r7:e0459e60 r6:84b16100 r5:84893000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xdff65fb0 to 0xdff65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e980 INFO: task kworker/0:179:3641 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cade0000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:180:3645 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:180 state:D stack:0 pid:3645 tgid:3645 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0469d84 r8:00000002 r7:60000113 r6:e0469d8c r5:84893c00 r4:84893c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84893c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0469e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e9c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84b5878c r4:84b58400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b16180 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0105fb0 to 0xe0105ff8) INFO: task kworker/0:181:3646 blocked for more than 453 seconds. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e046de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0ed00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84894800 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b58f8c r4:84b58c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b58f8c r4:84b16280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84894800 r8:84b162ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16280 r8:80287e08 r7:dff65e60 r6:84b16300 r5:84894800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe046dfb0 to 0xe046dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0eac0 INFO: task kworker/0:181:3646 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cb4a8000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0475e08 r9:83018005 r8:84b7bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:84b5978c r4:84b59400 r4:84b16380 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0105d28 to 0xe0105d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0105fb0 to 0xe0105ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:84896000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e042de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:184:3653 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:184 state:D stack:0 pid:3653 tgid:3653 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e047dd84 r8:00000002 r7:60000013 r6:e047dd8c r5:84895400 r4:84895400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84895400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e047de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1f240 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84895400 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfba9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b59b8c r4:84b59800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b59b8c r4:84b16500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84895400 r8:84b1652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16500 r8:80287e08 r7:e0475e60 r6:84afc580 r5:84895400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe047dfb0 to 0xe047dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1f100 INFO: task kworker/0:184:3653 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cbdb9000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:e0481d84 r8:00000002 r7:60000113 r6:e0481d8c r5:84b7d400 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b59f8c r4:84b59c00 r7:dddced80 r6:83018000 r5:84b59f8c r4:84b16580 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:186:3657 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:186 state:D stack:0 pid:3657 tgid:3657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0491d84 r8:00000002 r7:60000113 r6:e0491d8c r5:84b79800 r4:84b79800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b79800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0491e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1f880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b79800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5af8c r4:84b5ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5af8c r4:84b16600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b79800 r8:84b1662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16600 r8:80287e08 r7:e0481e60 r6:84afc680 r5:84b79800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0491fb0 to 0xe0491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1f2c0 INFO: task kworker/0:186:3657 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: Exception stack(0xe0105d28 to 0xe0105d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 Exception stack(0xe0105fb0 to 0xe0105ff8) task:kworker/0:187 state:D stack:0 pid:3659 tgid:3659 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:84b5a38c r4:84b5a000 r7:dddced80 r6:83018000 r5:84b5a38c r4:84b16680 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0105d28 to 0xe0105d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0499e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1f640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b7e000 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfca3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5a78c r4:84b5a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5a78c r4:84b16700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b7e000 r8:84b1672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16700 r8:80287e08 r7:e0491e60 r6:84afc780 r5:84b7e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0499fb0 to 0xe0499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1f440 INFO: task kworker/0:188:3660 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cc76c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:189:3662 blocked for more than 453 seconds. r4:84b7ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a1e08 r9:83018005 r8:84b7ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 r5:84b5ab8c r4:84b5a800 r10:61c88647 r9:84b7ec00 r8:84b167ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b1f840 Call trace: 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:e04a9d84 r8:00000002 r7:60000113 r6:e04a9d8c r5:84b7b000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a9e08 r5:00001000 r4:dfced000 r5:84b5b38c r4:84b5b000 r10:61c88647 r9:84b7b000 r8:84b1682c r7:82804d40 r6:dddced80 r5:dddceda0 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0105d28 to 0xe0105d70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:191:3667 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:191 state:D stack:0 pid:3667 tgid:3667 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04b1d84 r8:00000002 r7:60000113 r6:e04b1d8c r5:84b80c00 r4:84b80c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b80c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1fbc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b80c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5b78c r4:84b5b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5b78c r4:84b16880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b80c00 r8:84b168ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16880 r8:80287e08 r7:e04a9e60 r6:84afc900 r5:84b80c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b1fb0 to 0xe04b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1f980 INFO: task kworker/0:191:3667 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cce26000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84aec980 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b5e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b5bb8c r4:84b5b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5bb8c r4:84b16900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b81800 r8:84b1692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16900 r8:80287e08 r7:e04b1e60 r6:84afc980 r5:84b81800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b5fb0 to 0xe04b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1f980 INFO: task kworker/0:192:3668 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cce26000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:193:3671 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:193 state:D stack:0 pid:3671 tgid:3671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04c9d84 r8:00000002 r7:60000113 r6:e04c9d8c r5:84b83c00 r4:84b83c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b83c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0ee80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b83c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5cb8c r4:84b5c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5cb8c r4:84b16980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b83c00 r8:84b169ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16980 r8:80287e08 r7:e04b5e60 r6:84afca00 r5:84b83c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04c9fb0 to 0xe04c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1fb80 INFO: task kworker/0:193:3671 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cd16d000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:194 state:D stack:0 pid:3673 tgid:3673 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84b84800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:dfd33000 r5:84b5bf8c r4:84b5bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84b16a00 r8:80287e08 r7:e04c9e60 r6:84afca80 r5:84b84800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d1fb0 to 0xe04d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1fec0 INFO: task kworker/0:194:3673 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cd2c4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:195:3674 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:195 state:D stack:0 pid:3674 tgid:3674 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04a5d84 r8:00000002 r7:60000013 r6:e04a5d8c r5:84896c00 r4:84896c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84896c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:dfd47000 r5:84b5c38c r4:84b5c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5c38c r4:84b16a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 r4:84b1fc80 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0105d28 to 0xe0105d70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:196:3676 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:196 state:D stack:0 pid:3676 tgid:3676 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04cdd84 r8:00000002 r7:60000013 r6:e04cdd8c r5:84a58000 r4:84a58000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a58000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:847ee700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a58000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5c78c r4:84b5c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5c78c r4:84b16b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a58000 r8:84b16bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16b80 r8:80287e08 r7:e04c9e60 r6:84b16c00 r5:84a58000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04cdfb0 to 0xe04cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:847eefc0 INFO: task kworker/0:196:3676 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cd593000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:197:3679 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:197 state:D stack:0 pid:3679 tgid:3679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04d5d84 r8:00000002 r7:60000113 r6:e04d5d8c r5:84a58c00 r4:84a58c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a58c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be61c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a58c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5d38c r4:84b5d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5d38c r4:84b16c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a58c00 r8:84b16cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16c80 r8:80287e08 r7:e04c9e60 r6:84b16d00 r5:84a58c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d5fb0 to 0xe04d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:197:3679 is blocked on a mutex likely owned by task kworker/0:172:3628. Call trace: Exception stack(0xe0105d28 to 0xe0105d70) 5d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84aec980 r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:84a59800 r5:84a59800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04d9e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be6040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a59800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdb1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5cf8c r4:84b5cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5cf8c r4:84b16d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a59800 r8:84b16dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16d80 r8:80287e08 r7:e04d5e60 r6:84b16e00 r5:84a59800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04d9fb0 to 0xe04d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be6080 INFO: task kworker/0:198:3680 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cd92c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:199:3683 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:199 state:D stack:0 pid:3683 tgid:3683 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04ddd84 r8:00000002 r7:60000013 r6:e04ddd8c r5:84a5a400 r4:84a5a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be6280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5d78c r4:84b5d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5d78c r4:84b16e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5a400 r8:84b16eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16e80 r8:80287e08 r7:e04d5e60 r6:84b16f00 r5:84a5a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04ddfb0 to 0xe04ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be6180 INFO: task kworker/0:199:3683 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 5d60: 80230ad0 80239bb0 80050013 ffffffff [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:200:3685 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:200 state:D stack:0 pid:3685 tgid:3685 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04e5d84 r8:00000002 r7:60000013 r6:e04e5d8c r5:84a5bc00 r4:84a5bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be6800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5df8c r4:84b5dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5df8c r4:84b16f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5bc00 r8:84b16fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b16f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b16f80 r8:80287e08 r7:e04dde60 r6:84be9000 r5:84a5bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e5fb0 to 0xe04e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be62c0 INFO: task kworker/0:200:3685 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cdba2000 e011d000 00000001 80239b98 7f4dd000 00000001 r4:82ac21e4 r4:e0105dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:201:3686 blocked for more than 453 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:201 state:D stack:0 pid:3686 tgid:3686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0471d84 r8:00000002 r7:60000113 r6:e0471d8c r5:84a5c800 r4:84a5c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0471e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be65c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5c800 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5db8c r4:84b5d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5db8c r4:84be9080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5c800 r8:84be90ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9080 r8:80287e08 r7:e04e5e60 r6:84be9100 r5:84a5c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0471fb0 to 0xe0471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be62c0 INFO: task kworker/0:201:3686 is blocked on a mutex likely owned by task kworker/0:172:3628. Workqueue: events bpf_prog_free_deferred Call trace: r4:00000000 Exception stack(0xe0105d28 to 0xe0105d70) r5:80050013 r4:80239bb0 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04e9d84 r8:00000002 r7:60000013 r6:e04e9d8c r5:84a5b000 r4:84a5b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b07f40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5b000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe95000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5eb8c r4:84b5e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5eb8c r4:84be9180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5b000 r8:84be91ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9180 r8:80287e08 r7:e04e5e60 r6:84be9200 r5:84a5b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e9fb0 to 0xe04e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be6180 INFO: task kworker/0:202:3688 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cdba2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:203:3690 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:203 state:D stack:0 pid:3690 tgid:3690 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04edd84 r8:00000002 r7:60000113 r6:e04edd8c r5:84a5d400 r4:84a5d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be6c00 r5:84b5e38c r4:84b5e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be9280 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r4:e0105dc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:86:3693 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:86 state:D stack:0 pid:3693 tgid:3693 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f9d84 r8:00000002 r7:60000013 r6:e04f9d8c r5:84928000 r4:84928000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84928000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009300 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84ad7b8c r4:84ad7800 r7:ddde2d80 r6:83018200 r5:84ad7b8c r4:84afcf00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:00000000 r5:00001000 r4:e0433000 r5:84b4eb8c r4:84b4e800 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:84929800 r5:84929800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0501e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:204:3696 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:204 state:D stack:0 pid:3696 tgid:3696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0505d84 r8:00000002 r7:60000113 r6:e0505d8c r5:8492a400 r4:8492a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0505e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be6ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492a400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5e78c r4:84b5e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5e78c r4:84be9400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492a400 r8:84be942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9400 r8:80287e08 r7:e04e9e60 r6:84be9500 r5:8492a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0505fb0 to 0xe0505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be6a40 INFO: task kworker/0:204:3696 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: ce476000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:205:3699 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:205 state:D stack:0 pid:3699 tgid:3699 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f5d84 r8:00000002 r7:60000113 r6:e04f5d8c r5:8492b000 r4:8492b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492b000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfebd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5ef8c r4:84b5ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5ef8c r4:84be9580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492b000 r8:84be95ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9580 r8:80287e08 r7:e04e9e60 r6:84be9600 r5:8492b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f5fb0 to 0xe04f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bea000 INFO: task kworker/0:205:3699 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: ce84c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:206:3702 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:206 state:D stack:0 pid:3702 tgid:3702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04f1d84 r8:00000002 r7:60000113 r6:e04f1d8c r5:8492bc00 r4:8492bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfed1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5f38c r4:84b5f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5f38c r4:84be9680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492bc00 r8:84be96ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9680 r8:80287e08 r7:e04f5e60 r6:84be9700 r5:8492bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04f1fb0 to 0xe04f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bea300 INFO: task kworker/0:206:3702 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: ce84c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:207:3704 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:207 state:D stack:0 pid:3704 tgid:3704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e050dd84 r8:00000002 r7:60000113 r6:e050dd8c r5:8492c800 r4:8492c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e050de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492c800 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5f78c r4:84b5f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5f78c r4:84be9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492c800 r8:84be97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9780 r8:80287e08 r7:e04f1e60 r6:84be9800 r5:8492c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe050dfb0 to 0xe050dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bea180 INFO: task kworker/0:207:3704 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: ceb7c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:208:3705 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:208 state:D stack:0 pid:3705 tgid:3705 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0515d84 r8:00000002 r7:60000113 r6:e0515d8c r5:84b86000 r4:84b86000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b86000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0515e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea5c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b86000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5ff8c r4:84b5fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5ff8c r4:84be9880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b86000 r8:84be98ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9880 r8:80287e08 r7:e050de60 r6:84afcb00 r5:84b86000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0515fb0 to 0xe0515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bea340 INFO: task kworker/0:208:3705 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cef9f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:209:3707 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:209 state:D stack:0 pid:3707 tgid:3707 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e051dd84 r8:00000002 r7:60000113 r6:e051dd8c r5:84b86c00 r4:84b86c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b86c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e051de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b86c00 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b5fb8c r4:84b5f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b5fb8c r4:84be9900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b86c00 r8:84be992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9900 r8:80287e08 r7:e0515e60 r6:84afcb80 r5:84b86c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe051dfb0 to 0xe051dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bea440 INFO: task kworker/0:209:3707 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cef9f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:210:3710 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:210 state:D stack:0 pid:3710 tgid:3710 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0529d84 r8:00000002 r7:60000113 r6:e0529d8c r5:84b82400 r4:84b82400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b82400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0529e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b82400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504838c r4:85048000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504838c r4:84be9980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b82400 r8:84be99ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9980 r8:80287e08 r7:e0515e60 r6:84afcc00 r5:84b82400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0529fb0 to 0xe0529ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bea600 INFO: task kworker/0:210:3710 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cf310000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:211:3711 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:211 state:D stack:0 pid:3711 tgid:3711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e052dd84 r8:00000002 r7:60000013 r6:e052dd8c r5:84b80000 r4:84b80000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b80000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e052de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bea9c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b80000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 r5:85048b8c r4:85048800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85048b8c r4:84be9a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b80000 r8:84be9a2c r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: Exception stack(0xe0105d28 to 0xe0105d70) 5d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dffe5000 r5:8504878c r4:85048400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b83000 r8:84be9b2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84be9b00 r8:80287e08 r7:e052de60 r6:84afcd00 r5:84b83000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0535fb0 to 0xe0535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84beab40 INFO: task kworker/0:212:3713 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cf6fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:213:3715 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:213 state:D stack:0 pid:3715 tgid:3715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0555d84 r8:00000002 r7:60000013 r6:e0555d8c r5:84b88c00 r4:84b88c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b88c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0555e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beaa00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b88c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85048f8c r4:85048c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85048f8c r4:84be9a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b88c00 r8:84be9aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9a80 r8:80287e08 r7:e052de60 r6:84afcd80 r5:84b88c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0555fb0 to 0xe0555ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84beaa80 INFO: task kworker/0:213:3715 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cf6fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:e0569d84 r8:00000002 r7:60000013 r6:e0569d8c r5:84b8b000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84beac80 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504938c r4:85049000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84be9b80 r10:00000000 r9:84be9b80 r8:80287e08 r7:e0555e60 r6:84afce00 r5:84b8b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0569fb0 to 0xe0569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84beaac0 INFO: task kworker/0:214:3718 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cf6fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:215:3719 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:215 state:D stack:0 pid:3719 tgid:3719 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0511d84 r8:00000002 r7:60000013 r6:e0511d8c r5:8492d400 r4:8492d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0511e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be6980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85049b8c r4:85049800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85049b8c r4:84be9c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492d400 r8:84be9c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9c00 r8:80287e08 r7:e0569e60 r6:84be9c80 r5:8492d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0511fb0 to 0xe0511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84beabc0 INFO: task kworker/0:215:3719 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cfb83000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:216:3722 blocked for more than 454 seconds. r4:8492ec00 r4:00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf8040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0575000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85049f8c r4:85049c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85049f8c r4:84be9d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492ec00 r8:84be9d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9d00 r8:80287e08 r7:e0511e60 r6:84be9d80 r5:8492ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04e1fb0 to 0xe04e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be6180 INFO: task kworker/0:216:3722 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: cff2c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:217:3724 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:217 state:D stack:0 pid:3724 tgid:3724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0565d84 r8:00000002 r7:60000113 r6:e0565d8c r5:8492e000 r4:8492e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8492e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0565e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf8240 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8492e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e057f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504a38c r4:8504a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504a38c r4:84be9e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8492e000 r8:84be9e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9e00 r8:80287e08 r7:e04e1e60 r6:84be9e80 r5:8492e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0565fb0 to 0xe0565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf8140 INFO: task kworker/0:217:3724 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d00f4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:218:3726 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:218 state:D stack:0 pid:3726 tgid:3726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e057dd84 r8:00000002 r7:60000113 r6:e057dd8c r5:84928c00 r4:84928c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84928c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e057de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf8640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84928c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504ab8c r4:8504a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504ab8c r4:84be9f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84928c00 r8:84be9f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84be9f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be9f00 r8:80287e08 r7:e0565e60 r6:84be9f80 r5:84928c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe057dfb0 to 0xe057dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf8100 INFO: task kworker/0:218:3726 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d00f4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:219:3728 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:219 state:D stack:0 pid:3728 tgid:3728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0589d84 r8:00000002 r7:60000113 r6:e0589d8c r5:84a5e000 r4:84a5e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0589e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf8300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a5e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0585000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504a78c r4:8504a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504a78c r4:85002000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5e000 r8:8500202c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002000 r8:80287e08 r7:e057de60 r6:85002080 r5:84a5e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0589fb0 to 0xe0589ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf82c0 INFO: task kworker/0:219:3728 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d00f4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:88:3731 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:88 state:D stack:0 pid:3731 tgid:3731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0025d84 r8:00000002 r7:60000013 r6:e0025d8c r5:84a5ec00 r4:84a5ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a5ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0025e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850093c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a5ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9fb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad7f8c r4:84ad7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ad7f8c r4:84afce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a5ec00 r8:84afceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84afce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84afce80 r8:80287e08 r7:e04f9e60 r6:85002100 r5:84a5ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0025fb0 to 0xe0025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85009240 INFO: task kworker/1:88:3731 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d04f5000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:89:3732 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:89 state:D stack:0 pid:3732 tgid:3732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0035d84 r8:00000002 r7:60000013 r6:e0035d8c r5:84a70000 r4:84a70000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a70000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0035e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009600 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a70000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84ad638c r4:84ad6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84ad638c r4:85080000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a70000 r8:8508002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080000 r8:80287e08 r7:e0025e60 r6:85002180 r5:84a70000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0035fb0 to 0xe0035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85009140 INFO: task kworker/1:89:3732 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d04f5000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:90:3736 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:90 state:D stack:0 pid:3736 tgid:3736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05b1d84 r8:00000002 r7:60000113 r6:e05b1d8c r5:84a70c00 r4:84a70c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a70c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009b40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a70c00 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc73000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb438c r4:84bb4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb438c r4:85080080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a70c00 r8:850800ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080080 r8:80287e08 r7:e0035e60 r6:85002200 r5:84a70c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05b1fb0 to 0xe05b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850095c0 INFO: task kworker/1:90:3736 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d0ee2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:91:3737 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:91 state:D stack:0 pid:3737 tgid:3737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00a5d84 r8:00000002 r7:60000013 r6:e00a5d8c r5:84a71800 r4:84a71800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a71800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a71800 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8446e38c r4:8446e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8446e38c r4:85080100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a71800 r8:8508012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080100 r8:80287e08 r7:e05b1e60 r6:85002280 r5:84a71800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00a5fb0 to 0xe00a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850094c0 INFO: task kworker/1:91:3737 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d0ee2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:92:3739 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:92 state:D stack:0 pid:3739 tgid:3739 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00cdd84 r8:00000002 r7:60000113 r6:e00cdd8c r5:84a72400 r4:84a72400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a72400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009d00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a72400 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb4b8c r4:84bb4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb4b8c r4:85080180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a72400 r8:850801ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080180 r8:80287e08 r7:e05b1e60 r6:85002300 r5:84a72400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00cdfb0 to 0xe00cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85009240 INFO: task kworker/1:92:3739 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d0ee2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:220:3740 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:220 state:D stack:0 pid:3740 tgid:3740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e007dd84 r8:00000002 r7:60000113 r6:e007dd8c r5:84a73000 r4:84a73000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a73000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e007de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85009840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a73000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8446ef8c r4:8446ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8446ef8c r4:85002380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a73000 r8:850023ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002380 r8:80287e08 r7:e057de60 r6:85002400 r5:84a73000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe007dfb0 to 0xe007dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf8840 INFO: task kworker/0:220:3740 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d0ee2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:221:3742 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:221 state:D stack:0 pid:3742 tgid:3742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00e1d84 r8:00000002 r7:60000113 r6:e00e1d8c r5:84a73c00 r4:84a73c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a73c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00e1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf8a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a73c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504af8c r4:8504ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504af8c r4:85002480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a73c00 r8:850024ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002480 r8:80287e08 r7:e007de60 r6:85002500 r5:84a73c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00e1fb0 to 0xe00e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf8840 INFO: task kworker/0:221:3742 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d0ee2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:222:3744 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:222 state:D stack:0 pid:3744 tgid:3744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e00d1d84 r8:00000002 r7:60000113 r6:e00d1d8c r5:84a74800 r4:84a74800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a74800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e00d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bff180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a74800 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504b38c r4:8504b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504b38c r4:85002580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a74800 r8:850025ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002580 r8:80287e08 r7:e00e1e60 r6:85002600 r5:84a74800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe00d1fb0 to 0xe00d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf8a40 INFO: task kworker/0:222:3744 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d1712000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:223:3745 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:223 state:D stack:0 pid:3745 tgid:3745 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05d1d84 r8:00000002 r7:60000113 r6:e05d1d8c r5:84a75400 r4:84a75400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a75400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a75400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506038c r4:85060000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506038c r4:85002680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a75400 r8:850026ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002680 r8:80287e08 r7:e00d1e60 r6:85002700 r5:84a75400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d1fb0 to 0xe05d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf8a40 INFO: task kworker/0:223:3745 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d1712000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:e05d5d84 r8:00000002 r7:60000013 r6:e05d5d8c r5:84a76000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:84a76000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb478c r4:84bb4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb478c r4:85080200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a76000 r8:8508022c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080200 r8:80287e08 r7:e00cde60 r6:85002780 r5:84a76000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05d5fb0 to 0xe05d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85009c80 INFO: task kworker/1:93:3747 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d1af2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:84a76c00 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84bb538c r4:84bb5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb538c r4:85080280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a76c00 r8:850802ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080280 r8:80287e08 r7:e00cde60 r6:85002800 r5:84a76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05ddfb0 to 0xe05ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85009c80 INFO: task kworker/1:94:3750 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d1af2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:95:3752 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:95 state:D stack:0 pid:3752 tgid:3752 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05e1d84 r8:00000002 r7:60000013 r6:e05e1d8c r5:85020000 r4:85020000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85020000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84bb4f8c r4:84bb4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85080300 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d1ed0000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:96:3754 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:96 state:D stack:0 pid:3754 tgid:3754 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:85020c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850893c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85020c00 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0055000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb5f8c r4:84bb5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb5f8c r4:85080380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85020c00 r8:850803ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fa0: 00000000 00000000 00000000 00000000 r4:00000000 r4:82ac21e4 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:e05b5d84 r8:00000002 r7:60000113 r6:e05b5d8c r5:84b8bc00 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089040 r5:84bb578c r4:84bb5400 r4:85080400 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d1ed0000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:98:3758 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:98 state:D stack:0 pid:3758 tgid:3758 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e05fdd84 r8:00000002 r7:60000013 r6:e05fdd8c r5:84b8a400 r4:84b8a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e05fde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850892c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:e0043000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb5b8c r4:84bb5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb5b8c r4:85080500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8a400 r8:8508052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080500 r8:80287e08 r7:e05f9e60 r6:85080580 r5:84b8a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe05fdfb0 to 0xe05fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089280 INFO: task kworker/1:98:3758 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 Exception stack(0xe0105d28 to 0xe0105d70) r4:e0105dc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b8c800 r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:84bb638c r4:85080600 5fa0: 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:100:3763 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:100 state:D stack:0 pid:3763 tgid:3763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0609d84 r8:00000002 r7:60000113 r6:e0609d8c r5:84b8d400 r4:84b8d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0609e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb6b8c r4:84bb6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84b8d400 r8:8508072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089480 INFO: task kworker/1:100:3763 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d2ba3000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e060dd84 r8:00000002 r7:60000013 r6:e060dd8c r5:84b8e000 r4:84b8e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e060de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850896c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0073000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb678c r4:84bb6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb678c r4:85080800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8e000 r8:8508082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080800 r8:80287e08 r7:e0609e60 r6:85080880 r5:84b8e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe060dfb0 to 0xe060dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089600 INFO: task kworker/1:101:3764 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d2e3c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:102:3766 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:102 state:D stack:0 pid:3766 tgid:3766 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0611d84 r8:00000002 r7:60000113 r6:e0611d8c r5:84b8ec00 r4:84b8ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b8ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0611e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850899c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b8ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e009f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb6f8c r4:84bb6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb6f8c r4:85080900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b8ec00 r8:8508092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080900 r8:80287e08 r7:e0609e60 r6:85080980 r5:84b8ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0611fb0 to 0xe0611ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089b00 INFO: task kworker/1:102:3766 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d2e3c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:103:3768 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:103 state:D stack:0 pid:3768 tgid:3768 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0601d84 r8:00000002 r7:60000113 r6:e0601d8c r5:84b88000 r4:84b88000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b88000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0601e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089f00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b88000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb778c r4:84bb7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb778c r4:85080a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b88000 r8:85080a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080a00 r8:80287e08 r7:e0611e60 r6:85080a80 r5:84b88000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0601fb0 to 0xe0601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089900 INFO: task kworker/1:103:3768 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d320c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:104:3769 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:104 state:D stack:0 pid:3769 tgid:3769 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0615d84 r8:00000002 r7:60000113 r6:e0615d8c r5:84b89800 r4:84b89800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b89800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0615e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85089b80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b89800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb738c r4:84bb7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb738c r4:85080b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b89800 r8:85080b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080b00 r8:80287e08 r7:e0601e60 r6:85080b80 r5:84b89800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0615fb0 to 0xe0615ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85089cc0 INFO: task kworker/1:104:3769 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d320c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:224:3772 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:224 state:D stack:0 pid:3772 tgid:3772 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0621d84 r8:00000002 r7:60000113 r6:e0621d8c r5:84b76c00 r4:84b76c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b76c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0621e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08d40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b76c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508df8c r4:8508dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8508df8c r4:85002980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b76c00 r8:850029ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002980 r8:80287e08 r7:e05d1e60 r6:85080c00 r5:84b76c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0621fb0 to 0xe0621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bff140 INFO: task kworker/0:224:3772 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d3407000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:105:3774 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:105 state:D stack:0 pid:3774 tgid:3774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e061dd84 r8:00000002 r7:60000113 r6:e061dd8c r5:85018000 r4:85018000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85018000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e061de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be6f40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85018000 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb7b8c r4:84bb7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb7b8c r4:85080c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018000 r8:85080cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080c80 r8:80287e08 r7:e0601e60 r6:85080d00 r5:85018000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe061dfb0 to 0xe061dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85009d40 INFO: task kworker/1:105:3774 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d3407000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:106:3776 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:106 state:D stack:0 pid:3776 tgid:3776 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0619d84 r8:00000002 r7:60000013 r6:e0619d8c r5:85018c00 r4:85018c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85018c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0619e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85018c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0111000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bb7f8c r4:84bb7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bb7f8c r4:85080d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85018c00 r8:85080dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080d80 r8:80287e08 r7:e061de60 r6:85080e00 r5:85018c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0619fb0 to 0xe0619ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85009d40 INFO: task kworker/1:106:3776 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d39c6000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:107:3778 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:107 state:D stack:0 pid:3778 tgid:3778 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0625d84 r8:00000002 r7:60000113 r6:e0625d8c r5:85019800 r4:85019800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85019800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0625e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003100 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85019800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0119000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbc38c r4:84bbc000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbc38c r4:85080e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85019800 r8:85080eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080e80 r8:80287e08 r7:e0619e60 r6:85080f00 r5:85019800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0625fb0 to 0xe0625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003000 INFO: task kworker/1:107:3778 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d39c6000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:108:3781 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:108 state:D stack:0 pid:3781 tgid:3781 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0635d84 r8:00000002 r7:60000113 r6:e0635d8c r5:85023000 r4:85023000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85023000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0635e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85023000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0127000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbc78c r4:84bbc400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbc78c r4:85080f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85023000 r8:85080fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85080f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85080f80 r8:80287e08 r7:e0625e60 r6:85002a00 r5:85023000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0635fb0 to 0xe0635ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003140 INFO: task kworker/1:108:3781 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d3c82000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:109:3782 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:109 state:D stack:0 pid:3782 tgid:3782 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0639d84 r8:00000002 r7:60000113 r6:e0639d8c r5:85024800 r4:85024800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85024800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0639e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85024800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0437000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbcb8c r4:84bbc800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbcb8c r4:84bfd000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85024800 r8:84bfd02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd000 r8:80287e08 r7:e0635e60 r6:85002a80 r5:85024800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0639fb0 to 0xe0639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003000 INFO: task kworker/1:109:3782 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d3fa0000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:110:3784 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:110 state:D stack:0 pid:3784 tgid:3784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0629d84 r8:00000002 r7:60000013 r6:e0629d8c r5:8501a400 r4:8501a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0629e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501a400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0455000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbd38c r4:84bbd000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbd38c r4:84bfd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501a400 r8:84bfd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd080 r8:80287e08 r7:e0639e60 r6:84bfd100 r5:8501a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0629fb0 to 0xe0629ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850033c0 INFO: task kworker/1:110:3784 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d4397000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:111:3786 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:111 state:D stack:0 pid:3786 tgid:3786 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e062dd84 r8:00000002 r7:60000113 r6:e062dd8c r5:8501b000 r4:8501b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e062de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0449000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbcf8c r4:84bbcc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbcf8c r4:84bfd180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501b000 r8:84bfd1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd180 r8:80287e08 r7:e0629e60 r6:84bfd200 r5:8501b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe062dfb0 to 0xe062dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850033c0 INFO: task kworker/1:111:3786 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d4397000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:112:3788 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:112 state:D stack:0 pid:3788 tgid:3788 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0641d84 r8:00000002 r7:60000013 r6:e0641d8c r5:8501bc00 r4:8501bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0641e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850038c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbd78c r4:84bbd400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbd78c r4:84bfd280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501bc00 r8:84bfd2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd280 r8:80287e08 r7:e0629e60 r6:84bfd300 r5:8501bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0641fb0 to 0xe0641ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003880 INFO: task kworker/1:112:3788 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d4596000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:113:3790 blocked for more than 454 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:113 state:D stack:0 pid:3790 tgid:3790 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e063dd84 r8:00000002 r7:60000113 r6:e063dd8c r5:8501d400 r4:8501d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e063de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003c40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0c1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbdf8c r4:84bbdc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbdf8c r4:84bfd380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501d400 r8:84bfd3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd380 r8:80287e08 r7:e0641e60 r6:84bfd400 r5:8501d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe063dfb0 to 0xe063dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003500 INFO: task kworker/1:113:3790 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d4795000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:114:3792 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:114 state:D stack:0 pid:3792 tgid:3792 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0645d84 r8:00000002 r7:60000013 r6:e0645d8c r5:8501c800 r4:8501c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0645e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003ac0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0bf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbdb8c r4:84bbd800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbdb8c r4:84bfd480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501c800 r8:84bfd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd480 r8:80287e08 r7:e063de60 r6:84bfd500 r5:8501c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0645fb0 to 0xe0645ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003c00 INFO: task kworker/1:114:3792 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d4962000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:115:3793 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:115 state:D stack:0 pid:3793 tgid:3793 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0649d84 r8:00000002 r7:60000113 r6:e0649d8c r5:8501ec00 r4:8501ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0649e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbe38c r4:84bbe000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbe38c r4:84bfd580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501ec00 r8:84bfd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd580 r8:80287e08 r7:e063de60 r6:84bfd600 r5:8501ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0649fb0 to 0xe0649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003c00 INFO: task kworker/1:115:3793 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d4bdb000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:116:3795 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:116 state:D stack:0 pid:3795 tgid:3795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0651d84 r8:00000002 r7:60000113 r6:e0651d8c r5:8501e000 r4:8501e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8501e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0651e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8501e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbe78c r4:84bbe400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbe78c r4:84bfd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8501e000 r8:84bfd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd680 r8:80287e08 r7:e0649e60 r6:84bfd700 r5:8501e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0651fb0 to 0xe0651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003940 INFO: task kworker/1:116:3795 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d4c87000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:117:3799 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:117 state:D stack:0 pid:3799 tgid:3799 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e064dd84 r8:00000002 r7:60000113 r6:e064dd8c r5:84b90000 r4:84b90000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b90000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e064de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9440 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b90000 r7:00000000 r6:83018200 r5:00001000 r4:7f0c9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0673000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbef8c r4:84bbec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbef8c r4:84bfd780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b90000 r8:84bfd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd780 r8:80287e08 r7:e0651e60 r6:84bfd800 r5:84b90000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe064dfb0 to 0xe064dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf9100 INFO: task kworker/1:117:3799 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d5204000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:118:3800 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:118 state:D stack:0 pid:3800 tgid:3800 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0665d84 r8:00000002 r7:60000113 r6:e0665d8c r5:84b90c00 r4:84b90c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b90c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0665e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b90c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0661000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbeb8c r4:84bbe800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbeb8c r4:84bfd880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b90c00 r8:84bfd8ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd880 r8:80287e08 r7:e064de60 r6:84bfd900 r5:84b90c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0665fb0 to 0xe0665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf9100 INFO: task kworker/1:118:3800 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d555b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:119:3803 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:119 state:D stack:0 pid:3803 tgid:3803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0671d84 r8:00000002 r7:60000113 r6:e0671d8c r5:84b91800 r4:84b91800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b91800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0671e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b91800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0679000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbf38c r4:84bbf000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbf38c r4:84bfd980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b91800 r8:84bfd9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfd980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfd980 r8:80287e08 r7:e064de60 r6:84bfda00 r5:84b91800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0671fb0 to 0xe0671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf9400 INFO: task kworker/1:119:3803 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d5faa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:120:3804 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:120 state:D stack:0 pid:3804 tgid:3804 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e067dd84 r8:00000002 r7:60000013 r6:e067dd8c r5:84b92400 r4:84b92400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b92400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e067de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b92400 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0687000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbf78c r4:84bbf400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbf78c r4:84bfda80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b92400 r8:84bfdaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfda80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfda80 r8:80287e08 r7:e0671e60 r6:84bfdb00 r5:84b92400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe067dfb0 to 0xe067dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf9540 INFO: task kworker/1:120:3804 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d5faa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:121:3806 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:121 state:D stack:0 pid:3806 tgid:3806 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0685d84 r8:00000002 r7:60000113 r6:e0685d8c r5:84b93000 r4:84b93000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b93000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0685e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b93000 r7:00000000 r6:83018200 r5:00001000 r4:7f0cf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e068d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbfb8c r4:84bbf800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbfb8c r4:84bfdb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b93000 r8:84bfdbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfdb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfdb80 r8:80287e08 r7:e067de60 r6:84bfdc00 r5:84b93000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0685fb0 to 0xe0685ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf9640 INFO: task kworker/1:121:3806 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d618e000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:122:3808 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:122 state:D stack:0 pid:3808 tgid:3808 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0691d84 r8:00000002 r7:60000113 r6:e0691d8c r5:84b93c00 r4:84b93c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b93c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0691e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9a00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b93c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bbff8c r4:84bbfc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bbff8c r4:84bfdc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b93c00 r8:84bfdcac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfdc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfdc80 r8:80287e08 r7:e0685e60 r6:84bfdd00 r5:84b93c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0691fb0 to 0xe0691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf98c0 INFO: task kworker/1:122:3808 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d6384000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:123:3810 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:123 state:D stack:0 pid:3810 tgid:3810 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0699d84 r8:00000002 r7:60000113 r6:e0699d8c r5:84b94800 r4:84b94800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b94800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0699e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85003940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b94800 r7:00000000 r6:83018200 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bc8b8c r4:84bc8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bc8b8c r4:84bfdd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b94800 r8:84bfddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfdd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfdd80 r8:80287e08 r7:e0691e60 r6:84bfde00 r5:84b94800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0699fb0 to 0xe0699ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf9980 INFO: task kworker/1:123:3810 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d63e1000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:124:3812 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:124 state:D stack:0 pid:3812 tgid:3812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06a5d84 r8:00000002 r7:60000013 r6:e06a5d8c r5:84b95400 r4:84b95400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b95400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b95400 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bc838c r4:84bc8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bc838c r4:84bfde80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b95400 r8:84bfdeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfde80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfde80 r8:80287e08 r7:e0699e60 r6:84bfdf00 r5:84b95400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06a5fb0 to 0xe06a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf9ac0 INFO: task kworker/1:124:3812 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d6e37000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:125:3814 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:125 state:D stack:0 pid:3814 tgid:3814 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0659d84 r8:00000002 r7:60000113 r6:e0659d8c r5:84b96000 r4:84b96000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b96000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0659e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf9c80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b96000 r7:00000000 r6:83018200 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06af000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bc878c r4:84bc8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bc878c r4:84bfdf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b96000 r8:84bfdfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bfdf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bfdf80 r8:80287e08 r7:e0699e60 r6:84bdd000 r5:84b96000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0659fb0 to 0xe0659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf9ac0 INFO: task kworker/1:125:3814 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d70e9000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:126:3816 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:126 state:D stack:0 pid:3816 tgid:3816 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06b9d84 r8:00000002 r7:60000113 r6:e06b9d8c r5:84b98000 r4:84b98000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b98000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1a900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b98000 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb75000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bca38c r4:84bca000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bca38c r4:84bdd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b98000 r8:84bdd0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdd080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd080 r8:80287e08 r7:e0699e60 r6:84bdd100 r5:84b98000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06b9fb0 to 0xe06b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85003f80 INFO: task kworker/1:126:3816 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d72c1000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:127:3818 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:127 state:D stack:0 pid:3818 tgid:3818 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0485d84 r8:00000002 r7:60000113 r6:e0485d8c r5:84b99800 r4:84b99800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b99800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0485e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1a040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:00001000 r4:df935000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84bc8f8c r4:84bdd180 r4:84bdd180 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b1a100 Workqueue: events bpf_prog_free_deferred r4:00000000 5d20: d74f9000 e011d000 00000001 80239b98 7f4dd000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0433000 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:128 state:D stack:0 pid:3819 tgid:3819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e049dd84 r8:00000002 r7:60000113 r6:e049dd8c r5:84b9a400 r4:84b9a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e049de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1a3c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b9a400 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bc938c r4:84bc9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bc938c r4:84bdd280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9a400 r8:84bdd2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdd280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd280 r8:80287e08 r7:e06b9e60 r6:84bdd300 r5:84b9a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe049dfb0 to 0xe049dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1a100 INFO: task kworker/1:128:3819 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d74f9000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:849d6240 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84bc978c r4:84bc9400 r10:61c88647 r9:84b9b000 r8:84bdd3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdd380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd380 r8:80287e08 r7:e06b9e60 r6:84bdd400 r5:84b9b000 r4:00000001 Exception stack(0xe06adfb0 to 0xe06adff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:130:3824 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:130 state:D stack:0 pid:3824 tgid:3824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04b9d84 r8:00000002 r7:60000113 r6:e04b9d8c r5:84b9bc00 r4:84b9bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1a540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b9bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bc9b8c r4:84bc9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bc9b8c r4:84bdd480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9bc00 r8:84bdd4ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdd480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd480 r8:80287e08 r7:e06b9e60 r6:84bdd500 r5:84b9bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04b9fb0 to 0xe04b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1a740 INFO: task kworker/1:130:3824 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d7a04000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:131:3825 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:131 state:D stack:0 pid:3825 tgid:3825 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e04add84 r8:00000002 r7:60000113 r6:e04add8c r5:84b9c800 r4:84b9c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e04ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1a780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b9c800 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bc9f8c r4:84bc9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bc9f8c r4:84bdd580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9c800 r8:84bdd5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdd580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd580 r8:80287e08 r7:e06b9e60 r6:84bdd600 r5:84b9c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe04adfb0 to 0xe04adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1a8c0 INFO: task kworker/1:131:3825 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d7bf9000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:132:3829 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:132 state:D stack:0 pid:3829 tgid:3829 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0521d84 r8:00000002 r7:60000013 r6:e0521d8c r5:84b9d400 r4:84b9d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0521e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1ac40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b9d400 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bcab8c r4:84bca800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bcab8c r4:84bdd680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9d400 r8:84bdd6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdd680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd680 r8:80287e08 r7:e06b9e60 r6:84bdd700 r5:84b9d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0521fb0 to 0xe0521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1a840 INFO: task kworker/1:132:3829 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d7bf9000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:133:3830 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:133 state:D stack:0 pid:3830 tgid:3830 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c5d84 r8:00000002 r7:60000013 r6:e06c5d8c r5:84b9e000 r4:84b9e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1a9c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84b9e000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bca78c r4:84bca400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bca78c r4:84bdd780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b9e000 r8:84bdd7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdd780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdd780 r8:80287e08 r7:e0521e60 r6:84bdd800 r5:84b9e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c5fb0 to 0xe06c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1aa00 INFO: task kworker/1:133:3830 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:134:3832 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:134 state:D stack:0 pid:3832 tgid:3832 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06c9d84 r8:00000002 r7:60000113 r6:e06c9d8c r5:84b9ec00 r4:84b9ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b9ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06c9e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1adc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0105dc0 r5:00001000 r4:e0433000 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:84b96c00 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfcd3000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bcb38c r4:84bcb000 r7:ddde2d80 r6:83018200 r5:84bcb38c r4:84bdd980 r4:84bdd980 r10:00000000 r9:84bdd980 r8:80287e08 r7:e06c9e60 r6:84bdda00 r5:84b96c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06c1fb0 to 0xe06c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1ad00 INFO: task kworker/1:135:3834 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d856b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:136:3837 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:136 state:D stack:0 pid:3837 tgid:3837 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06cdd84 r8:00000002 r7:60000113 r6:e06cdd8c r5:850b8000 r4:850b8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850b8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b13040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcfb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bcb78c r4:84bcb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bcb78c r4:84bdda80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850b8000 r8:84bddaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bdda80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bdda80 r8:80287e08 r7:e06c1e60 r6:84bddb00 r5:850b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06cdfb0 to 0xe06cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b13000 INFO: task kworker/1:136:3837 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 5d20: d8ad7000 e011d000 00000001 80239b98 7f4dd000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 Not tainted 6.15.0-rc7-syzkaller #0 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bddb80 r8:80287e08 r7:e06cde60 r6:84bddc00 r5:850b8c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b13000 INFO: task kworker/1:137:3838 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d8fa2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:138:3840 blocked for more than 455 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:138 state:D stack:0 pid:3840 tgid:3840 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06ddd84 r8:00000002 r7:60000113 r6:e06ddd8c r5:85021800 r4:85021800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85021800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b13d00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85021800 r7:00000000 r6:83018200 r5:00001000 r4:7f071000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:84bd578c r4:84bddc80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0105dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aec980 r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/1:139:3841 blocked for more than 455 seconds. Workqueue: events bpf_prog_free_deferred r4:85023c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85023c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b132c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85023c00 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bcbb8c r4:84bcb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bcbb8c r4:84bddd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85023c00 r8:84bddd2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bddd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bddd00 r8:80287e08 r7:e06dde60 r6:85002b80 r5:85023c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e1fb0 to 0xe06e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b13480 INFO: task kworker/1:139:3841 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d91e0000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 r4:849d6240 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85026c00 r8:84bdddac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bddd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bddd80 r8:80287e08 r7:e06dde60 r6:85002c00 r5:85026c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06edfb0 to 0xe06edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b135c0 INFO: task kworker/1:140:3844 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d964d000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:141:3845 blocked for more than 456 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:850b9800 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd478c r4:84bd4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84bdde00 r8:80287e08 r7:e06dde60 r6:84bdde80 r5:850b9800 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 5d20: d964d000 e011d000 00000001 80239b98 7f4dd000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:142:3847 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:142 state:D stack:0 pid:3847 tgid:3847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06e9d84 r8:00000002 r7:60000113 r6:e06e9d8c r5:850bb000 r4:850bb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850bb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b136c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdcb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd4b8c r4:84bd4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bd4b8c r4:84bddf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850bb000 r8:84bddf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84bddf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bddf00 r8:80287e08 r7:e06dde60 r6:84bddf80 r5:850bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06e9fb0 to 0xe06e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b13700 INFO: task kworker/1:142:3847 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:849d6240 task:kworker/1:143 state:D stack:0 pid:3848 tgid:3848 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd4f8c r4:84bd4c00 r4:84af6000 r4:84b13700 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d9bd4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:144:3851 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:144 state:D stack:0 pid:3851 tgid:3851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06f9d84 r8:00000002 r7:60000113 r6:e06f9d8c r5:850ba400 r4:850ba400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850ba400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b13c40 r4:00000000 r5:00001000 r4:dfe25000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b13a00 INFO: task kworker/1:144:3851 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: d9d7a000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 Not tainted 6.15.0-rc7-syzkaller #0 r4:850be000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 5d20: da4c4000 e011d000 00000001 80239b98 7f4dd000 00000001 r4:00000000 r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:147:3858 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:147 state:D stack:0 pid:3858 tgid:3858 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e06d9d84 r8:00000002 r7:60000113 r6:e06d9d8c r5:850bec00 r4:850bec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850bec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e06d9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b02040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfea9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd638c r4:84bd6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bd638c r4:84af6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850bec00 r8:84af642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af6400 r8:80287e08 r7:e0701e60 r6:84af6480 r5:850bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe06d9fb0 to 0xe06d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1a080 INFO: task kworker/1:147:3858 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:80050013 r4:80239bb0 r5:84b4eb8c r4:84b4e800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b02240 INFO: task kworker/1:148:3860 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: da60c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:149:3861 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:149 state:D stack:0 pid:3861 tgid:3861 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e070dd84 r8:00000002 r7:60000113 r6:e070dd8c r5:850c0c00 r4:850c0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e070de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b02140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd678c r4:84bd6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bd678c r4:84af6600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c0c00 r8:84af662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af6600 r8:80287e08 r7:e0705e60 r6:84af6680 r5:850c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe070dfb0 to 0xe070dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b02100 INFO: task kworker/1:149:3861 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: da975000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:150:3863 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:150 state:D stack:0 pid:3863 tgid:3863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0711d84 r8:00000002 r7:60000013 r6:e0711d8c r5:850c1800 r4:850c1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0711e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b02700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c1800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd6f8c r4:84bd6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bd6f8c r4:84af6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c1800 r8:84af672c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af6700 r8:80287e08 r7:e0705e60 r6:84af6780 r5:850c1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0711fb0 to 0xe0711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b02100 INFO: task kworker/1:150:3863 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dabba000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:151:3865 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:151 state:D stack:0 pid:3865 tgid:3865 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0715d84 r8:00000002 r7:60000113 r6:e0715d8c r5:850c3000 r4:850c3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0715e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b02a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0487000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd778c r4:84bd7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bd778c r4:84af6800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c3000 r8:84af682c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af6800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af6800 r8:80287e08 r7:e0711e60 r6:84af6880 r5:850c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0715fb0 to 0xe0715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b02280 INFO: task kworker/1:151:3865 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe071dfb0 to 0xe071dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b02800 INFO: task kworker/1:152:3868 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dae8b000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:153:3871 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:153 state:D stack:0 pid:3871 tgid:3871 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0721d84 r8:00000002 r7:60000113 r6:e0721d8c r5:850c5400 r4:850c5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0721e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018205 r8:850c5400 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r5:00001000 r4:e0519000 r7:ddde2d80 r6:83018200 r5:8508c38c r4:84af6a00 1fa0: 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:e0725d84 r8:00000002 r7:60000113 r6:e0725d8c r5:850c4800 r4:850c4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0725e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b02d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c4800 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84bd7b8c r4:84bd7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84bd7b8c r4:84af6b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c4800 r8:84af6b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af6b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af6b00 r8:80287e08 r7:e0721e60 r6:84af6b80 r5:850c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0725fb0 to 0xe0725ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b02780 INFO: task kworker/1:154:3872 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: db140000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:00001000 r4:e0507000 r5:84bd7f8c r4:84bd7c00 r4:84af6c00 9fa0: 00000000 00000000 00000000 00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:156:3877 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:156 state:D stack:0 pid:3877 tgid:3877 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0729d84 r8:00000002 r7:60000013 r6:e0729d8c r5:850c6c00 r4:850c6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0729e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ce040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e052f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508c78c r4:8508c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508c78c r4:84af6d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c6c00 r8:84af6d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84af6d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84af6d00 r8:80287e08 r7:e0721e60 r6:84af6d80 r5:850c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0729fb0 to 0xe0729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 5d20: db685000 e011d000 00000001 80239b98 7f4dd000 00000001 r4:e0105dc0 r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:157:3878 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:157 state:D stack:0 pid:3878 tgid:3878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0709d84 r8:00000002 r7:60000013 r6:e0709d8c r5:850c2400 r4:850c2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:e0559000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8508cf8c r4:84af6e00 r4:84b02ac0 5d20: db7b1000 e011d000 00000001 80239b98 7f4dd000 00000001 r5:84b4eb8c r4:84b4e800 r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 Not tainted 6.15.0-rc7-syzkaller #0 r4:850bc800 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ce100 r5:00001000 r4:e0539000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:849ce140 task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: db8f5000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:159:3884 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:159 state:D stack:0 pid:3884 tgid:3884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0735d84 r8:00000002 r7:60000013 r6:e0735d8c r5:850c8c00 r4:850c8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:df979000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8508d38c r4:849dc000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0741d84 r8:00000002 r7:60000113 r6:e0741d8c r5:850c9800 r4:850c9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0741e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ce900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c9800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508db8c r4:8508d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508db8c r4:849dc100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c9800 r8:849dc12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849dc100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849dc100 r8:80287e08 r7:e0735e60 r6:849dc180 r5:850c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0741fb0 to 0xe0741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ce380 INFO: task kworker/1:160:3885 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r4:00000000 r5:84b4eb8c r4:84b4e800 r4:84aec980 5fa0: 00000000 00000000 00000000 00000000 r4:850ca400 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:ddde2d80 r6:83018200 r5:8508d78c r4:849dc200 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0105d28 to 0xe0105d70) r4:82ac21e4 r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:162:3890 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:162 state:D stack:0 pid:3890 tgid:3890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0749d84 r8:00000002 r7:60000113 r6:e0749d8c r5:850c8000 r4:850c8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850c8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0749e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae9000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850c8000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0039000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508ef8c r4:8508ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508ef8c r4:849dc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850c8000 r8:849dc32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849dc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849dc300 r8:80287e08 r7:e0741e60 r6:849dc380 r5:850c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0749fb0 to 0xe0749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ce980 INFO: task kworker/1:162:3890 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 5d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8508e38c r4:849dc400 task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dc137000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:850cc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e074de08 r5:00001000 r4:dffff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8508eb8c r4:849dc500 Exception stack(0xe074dfb0 to 0xe074dff8) Workqueue: events bpf_prog_free_deferred 5d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0105dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aec980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:225 state:D stack:0 pid:3896 tgid:3896 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cee00 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:85002c80 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:226:3898 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:226 state:D stack:0 pid:3898 tgid:3898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e075dd84 r8:00000002 r7:60000113 r6:e075dd8c r5:85022400 r4:85022400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85022400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e075de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b08500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85022400 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e001d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8504bf8c r4:8504bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8504bf8c r4:85002d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85022400 r8:85002dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002d80 r8:80287e08 r7:e05d1e60 r6:85002e00 r5:85022400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe075dfb0 to 0xe075dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b08ec0 INFO: task kworker/0:226:3898 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dc4c6000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84aec980 Exception stack(0xe0105fb0 to 0xe0105ff8) INFO: task kworker/1:165:3899 blocked for more than 456 seconds. [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8508f38c r4:849dc600 Exception stack(0xe0761fb0 to 0xe0761ff8) Workqueue: events bpf_prog_free_deferred 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r4:00000000 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:227:3902 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:227 state:D stack:0 pid:3902 tgid:3902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0751d84 r8:00000002 r7:60000113 r6:e0751d8c r5:84b98c00 r4:84b98c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b98c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0751e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c5600 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84b98c00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0453000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495478c r4:84954400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495478c r4:85002f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b98c00 r8:85002f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85002f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85002f00 r8:80287e08 r7:e05d1e60 r6:85002f80 r5:84b98c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0751fb0 to 0xe0751ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b084c0 INFO: task kworker/0:227:3902 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dcbe2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:166:3904 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:166 state:D stack:0 pid:3904 tgid:3904 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0771d84 r8:00000002 r7:60000113 r6:e0771d8c r5:84b85400 r4:84b85400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84b85400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0771e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae9340 r5:00001000 r4:e0071000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8508f78c r4:8508f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8508f78c r4:849dc680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84b85400 r8:849dc6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849dc680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849dc680 r8:80287e08 r7:e0761e60 r6:849ca000 r5:84b85400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0771fb0 to 0xe0771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ae90c0 INFO: task kworker/1:166:3904 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ae9280 INFO: task kworker/1:167:3906 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dcee4000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:850d0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e077de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8509038c r4:849dc780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Workqueue: events bpf_prog_free_deferred Exception stack(0xe0105d28 to 0xe0105d70) 5d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) task:kworker/1:169 state:D stack:0 pid:3910 tgid:3910 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850d2400 r8:849dc82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dd014000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:170:3913 blocked for more than 456 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:170 state:D stack:0 pid:3913 tgid:3913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0791d84 r8:00000002 r7:60000013 r6:e0791d8c r5:850d1800 r4:850d1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0791e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae97c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d1800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:8509078c r4:849dc880 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0105d28 to 0xe0105d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae98c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d4800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0113000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85090b8c r4:85090800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85090b8c r4:849dc900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d4800 r8:849dc92c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849dc900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849dc900 r8:80287e08 r7:e0791e60 r6:849ca280 r5:850d4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07a1fb0 to 0xe07a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ae96c0 INFO: task kworker/1:171:3915 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dd6c2000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0105fb0 to 0xe0105ff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:850d3000 r8:849dc9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8509138c r4:85091000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509138c r4:849dca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ce000 r8:849dca2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849dca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849dca00 r8:80287e08 r7:e07ade60 r6:849dca80 r5:850ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0781fb0 to 0xe0781ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84ae9840 INFO: task kworker/1:173:3918 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dd9aa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r5:850cd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0789e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84ae9ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850cd400 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509178c r4:85091400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509178c r4:849dcb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850cd400 r8:849dcb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849dcb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849dcb00 r8:80287e08 r7:e0781e60 r6:849dcb80 r5:850cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0789fb0 to 0xe0789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred 5d20: ddfe8000 e011d000 00000001 80239b98 7f4dd000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b5e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85091b8c r4:849dcc00 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:228:3924 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:228 state:D stack:0 pid:3924 tgid:3924 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07b9d84 r8:00000002 r7:60000113 r6:e07b9d8c r5:850d8c00 r4:850d8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c5d00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850d8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4873000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8446db8c r4:8446d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8446db8c r4:849ca380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d8c00 r8:849ca3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849ca380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca380 r8:80287e08 r7:e05d1e60 r6:849dcd00 r5:850d8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b9fb0 to 0xe07b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c55c0 INFO: task kworker/0:228:3924 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:176:3925 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:176 state:D stack:0 pid:3925 tgid:3925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07bdd84 r8:00000002 r7:60000013 r6:e07bdd8c r5:850d9800 r4:850d9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dd240 r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:85091f8c r4:849dcd80 r10:00000000 r9:849dcd80 r8:80287e08 r7:e07b5e60 r6:849dce00 r5:850d9800 r4:849ceac0 r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Call trace: [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dd440 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:850da400 r8:849dceac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0105d28 to 0xe0105d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84aec980 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/1:178 state:D stack:0 pid:3930 tgid:3930 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07c9e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dd640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dc800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509278c r4:85092400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509278c r4:849dcf80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850dc800 r8:849dcfac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:849dcf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849dcf80 r8:80287e08 r7:e07c1e60 r6:84ae8000 r5:850dc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07c9fb0 to 0xe07c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849dd400 INFO: task kworker/1:178:3930 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: de205000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:179:3932 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:179 state:D stack:0 pid:3932 tgid:3932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07d5d84 r8:00000002 r7:60000113 r6:e07d5d8c r5:850dbc00 r4:850dbc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850dbc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ddc40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509338c r4:85093000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509338c r4:84ae8080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850dbc00 r8:84ae80ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8080 r8:80287e08 r7:e07c9e60 r6:84ae8100 r5:850dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d5fb0 to 0xe07d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849dd380 INFO: task kworker/1:179:3932 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: de90f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:180:3934 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:180 state:D stack:0 pid:3934 tgid:3934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07d9d84 r8:00000002 r7:60000013 r6:e07d9d8c r5:850db000 r4:850db000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850db000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07d9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dd880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850db000 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05ef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85092b8c r4:85092800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85092b8c r4:84ae8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850db000 r8:84ae81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8180 r8:80287e08 r7:e07d5e60 r6:84ae8200 r5:850db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07d9fb0 to 0xe07d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849dd580 INFO: task kworker/1:180:3934 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: de90f000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:181:3935 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:181 state:D stack:0 pid:3935 tgid:3935 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07b1d84 r8:00000002 r7:60000113 r6:e07b1d8c r5:850de000 r4:850de000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850de000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dda40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850de000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0653000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85092f8c r4:85092c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85092f8c r4:84ae8280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850de000 r8:84ae82ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8280 r8:80287e08 r7:e07d5e60 r6:84ae8300 r5:850de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07b1fb0 to 0xe07b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ddb80 INFO: task kworker/1:181:3935 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: decfe000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:182:3938 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:182 state:D stack:0 pid:3938 tgid:3938 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07f1d84 r8:00000002 r7:60000113 r6:e07f1d8c r5:850dec00 r4:850dec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850dec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849dde40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0675000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509378c r4:85093400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509378c r4:84ae8380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850dec00 r8:84ae83ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8380 r8:80287e08 r7:e07d5e60 r6:84ae8400 r5:850dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f1fb0 to 0xe07f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ddb00 INFO: task kworker/1:182:3938 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: decfe000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:183:3940 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:183 state:D stack:0 pid:3940 tgid:3940 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07edd84 r8:00000002 r7:60000113 r6:e07edd8c r5:850cb000 r4:850cb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850cb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cd080 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850cb000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0681000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85093b8c r4:85093800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85093b8c r4:84ae8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850cb000 r8:84ae84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8480 r8:80287e08 r7:e07f1e60 r6:84ae8500 r5:850cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07edfb0 to 0xe07edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849dde00 INFO: task kworker/1:183:3940 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: df001000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:184:3942 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:184 state:D stack:0 pid:3942 tgid:3942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e0765d84 r8:00000002 r7:60000113 r6:e0765d8c r5:850cec00 r4:850cec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850cec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e0765e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cd240 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850cec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0693000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85093f8c r4:85093c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85093f8c r4:84ae8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850cec00 r8:84ae85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8580 r8:80287e08 r7:e07ede60 r6:84ae8600 r5:850cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0765fb0 to 0xe0765ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cd0c0 INFO: task kworker/1:184:3942 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: df001000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:185:3945 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:185 state:D stack:0 pid:3945 tgid:3945 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07f5d84 r8:00000002 r7:60000113 r6:e07f5d8c r5:850e0000 r4:850e0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cd340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509838c r4:85098000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509838c r4:84ae8680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e0000 r8:84ae86ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8680 r8:80287e08 r7:e0765e60 r6:84ae8700 r5:850e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f5fb0 to 0xe07f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cd200 INFO: task kworker/1:185:3945 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: df6fa000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:186:3946 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:186 state:D stack:0 pid:3946 tgid:3946 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07fdd84 r8:00000002 r7:60000013 r6:e07fdd8c r5:850e0c00 r4:850e0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07fde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cd4c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509878c r4:85098400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509878c r4:84ae8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e0c00 r8:84ae87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8780 r8:80287e08 r7:e07f5e60 r6:84ae8800 r5:850e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07fdfb0 to 0xe07fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cd2c0 INFO: task kworker/1:186:3946 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: df90c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:187:3948 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:187 state:D stack:0 pid:3948 tgid:3948 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e07f9d84 r8:00000002 r7:60000013 r6:e07f9d8c r5:850e1800 r4:850e1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e07f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cd700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85098b8c r4:85098800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85098b8c r4:84ae8880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e1800 r8:84ae88ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8880 r8:80287e08 r7:e07fde60 r6:84ae8900 r5:850e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe07f9fb0 to 0xe07f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cd2c0 INFO: task kworker/1:187:3948 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: df90c000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:188:3950 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:188 state:D stack:0 pid:3950 tgid:3950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4805d84 r8:00000002 r7:60000113 r6:e4805d8c r5:850e2400 r4:850e2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4805e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cd980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850e2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0795000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509938c r4:85099000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509938c r4:84ae8980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e2400 r8:84ae89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8980 r8:80287e08 r7:e07f9e60 r6:84ae8a00 r5:850e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4805fb0 to 0xe4805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cd6c0 INFO: task kworker/1:188:3950 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dfe34000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0105dc0 r5:e0105e08 r4:e0105dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:189:3951 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:189 state:D stack:0 pid:3951 tgid:3951 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e480dd84 r8:00000002 r7:60000113 r6:e480dd8c r5:850d6000 r4:850d6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e480de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cd780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d6000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0767000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85098f8c r4:85098c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85098f8c r4:84ae8a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d6000 r8:84ae8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8a80 r8:80287e08 r7:e4805e60 r6:849ca400 r5:850d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe480dfb0 to 0xe480dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cd6c0 INFO: task kworker/1:189:3951 is blocked on a mutex likely owned by task kworker/0:172:3628. task:kworker/0:172 state:R running task stack:0 pid:3628 tgid:3628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4ec00 r8:80200be4 r7:e0105d5c r6:ffffffff r5:84a4ec00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0105d28 to 0xe0105d70) 5d20: dfe34000 e011d000 00000001 80239b98 7f4dd000 00000001 5d40: 82ac15a0 7f4dd000 e011d000 8280c928 82ac21c4 e0105da4 e0105da8 e0105d78 5d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:84a4ec00 [<81a55b64>] (mutex_unlock) from [<804e79e8>] (_vm_unmap_aliases+0x208/0x240 mm/vmalloc.c:2901) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84afecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0433000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4eb8c r4:84b4e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4eb8c r4:84aec980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4ec00 r8:84aec9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aec980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aec980 r8:80287e08 r7:e0125e60 r6:84aeca00 r5:84a4ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0105fb0 to 0xe0105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d6240 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:190:3955 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:190 state:D stack:0 pid:3955 tgid:3955 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e481dd84 r8:00000002 r7:60000113 r6:e481dd8c r5:850d5400 r4:850d5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e481de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cda80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850d5400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07cb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509978c r4:85099400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509978c r4:84ae8b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d5400 r8:84ae8b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8b00 r8:80287e08 r7:e4805e60 r6:849ca480 r5:850d5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe481dfb0 to 0xe481dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cd940 INFO: task kworker/1:190:3955 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 7f7f2000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:191:3956 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:191 state:D stack:0 pid:3956 tgid:3956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4821d84 r8:00000002 r7:60000113 r6:e4821d8c r5:850dd400 r4:850dd400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850dd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4821e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cdcc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4846000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85099f8c r4:85099c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85099f8c r4:84ae8b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850dd400 r8:84ae8bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8b80 r8:80287e08 r7:e481de60 r6:849ca500 r5:850dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4821fb0 to 0xe4821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cda00 INFO: task kworker/1:191:3956 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 7fb74000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:192:3957 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:192 state:D stack:0 pid:3957 tgid:3957 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4849d84 r8:00000002 r7:60000113 r6:e4849d8c r5:849a8000 r4:849a8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4849e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cdc00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849a8000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85099b8c r4:85099800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85099b8c r4:84ae8c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849a8000 r8:84ae8c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8c00 r8:80287e08 r7:e4821e60 r6:849ca580 r5:849a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4849fb0 to 0xe4849ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cda00 INFO: task kworker/1:192:3957 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 7fb74000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:193:3960 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:193 state:D stack:0 pid:3960 tgid:3960 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4859d84 r8:00000002 r7:60000013 r6:e4859d8c r5:849aa400 r4:849aa400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849aa400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4859e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ddec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849aa400 r7:00000000 r6:83018200 r5:00001000 r4:7f0b9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4861000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509a78c r4:8509a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509a78c r4:84ae8c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849aa400 r8:84ae8cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8c80 r8:80287e08 r7:e4821e60 r6:849ca600 r5:849aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4859fb0 to 0xe4859ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cdb40 INFO: task kworker/1:193:3960 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 7fb74000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:194:3961 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:194 state:D stack:0 pid:3961 tgid:3961 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4865d84 r8:00000002 r7:60000113 r6:e4865d8c r5:849a8c00 r4:849a8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4865e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849cde40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e485b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509a38c r4:8509a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509a38c r4:84ae8d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849a8c00 r8:84ae8d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8d00 r8:80287e08 r7:e4859e60 r6:849ca680 r5:849a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4865fb0 to 0xe4865ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849cddc0 INFO: task kworker/1:194:3961 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 7fe1f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 90050013 ffffffff r5:90050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:195:3963 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:195 state:D stack:0 pid:3963 tgid:3963 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4871d84 r8:00000002 r7:60000113 r6:e4871d8c r5:849ab000 r4:849ab000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ab000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4871e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aae000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849ab000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df983000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509ab8c r4:8509a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509ab8c r4:84ae8d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ab000 r8:84ae8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8d80 r8:80287e08 r7:e4859e60 r6:849ca700 r5:849ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4871fb0 to 0xe4871ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ddfc0 INFO: task kworker/1:195:3963 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 800b0000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:229:3969 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:229 state:D stack:0 pid:3969 tgid:3969 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4855d84 r8:00000002 r7:60000113 r6:e4855d8c r5:849abc00 r4:849abc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849abc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4855e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85060f8c r4:85060c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85060f8c r4:849ca780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849abc00 r8:849ca7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849ca780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca780 r8:80287e08 r7:e05d1e60 r6:849ca800 r5:849abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4855fb0 to 0xe4855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aad000 INFO: task kworker/0:229:3969 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 800b0000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:230:3970 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:230 state:D stack:0 pid:3970 tgid:3970 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e4809d84 r8:00000002 r7:60000013 r6:e4809d8c r5:849ac800 r4:849ac800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ac800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e4809e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506078c r4:85060400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506078c r4:849ca880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ac800 r8:849ca8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849ca880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca880 r8:80287e08 r7:e4855e60 r6:849ca900 r5:849ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe4809fb0 to 0xe4809ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aad300 INFO: task kworker/0:230:3970 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8051c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:231:3974 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:231 state:D stack:0 pid:3974 tgid:3974 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e487dd84 r8:00000002 r7:60000013 r6:e487dd8c r5:849ad400 r4:849ad400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ad400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e487de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85060b8c r4:85060800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85060b8c r4:849ca980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ad400 r8:849ca9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849ca980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849ca980 r8:80287e08 r7:e4855e60 r6:849caa00 r5:849ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe487dfb0 to 0xe487dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aad440 INFO: task kworker/0:231:3974 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8096e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:232:3975 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:232 state:D stack:0 pid:3975 tgid:3975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8885d84 r8:00000002 r7:60000013 r6:e8885d8c r5:849ae000 r4:849ae000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849ae000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8885e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfccb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506138c r4:85061000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506138c r4:849caa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849ae000 r8:849caaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849caa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849caa80 r8:80287e08 r7:e4855e60 r6:849cab00 r5:849ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8885fb0 to 0xe8885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aad440 INFO: task kworker/0:232:3975 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8096e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:233:3978 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:233 state:D stack:0 pid:3978 tgid:3978 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e888dd84 r8:00000002 r7:60000013 r6:e888dd8c r5:849aec00 r4:849aec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849aec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e888de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcfd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506178c r4:85061400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506178c r4:849cab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849aec00 r8:849cabac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849cab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849cab80 r8:80287e08 r7:e8885e60 r6:849cac00 r5:849aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe888dfb0 to 0xe888dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aad700 INFO: task kworker/0:233:3978 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 80e23000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:234:3979 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:234 state:D stack:0 pid:3979 tgid:3979 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8895d84 r8:00000002 r7:60000113 r6:e8895d8c r5:849a9800 r4:849a9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849a9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8895e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aadc00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfdbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506238c r4:85062000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506238c r4:849cac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849a9800 r8:849cacac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849cac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849cac80 r8:80287e08 r7:e888de60 r6:849cad00 r5:849a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8895fb0 to 0xe8895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aad700 INFO: task kworker/0:234:3979 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 80e23000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:235:3980 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:235 state:D stack:0 pid:3980 tgid:3980 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8889d84 r8:00000002 r7:60000013 r6:e8889d8c r5:850d6c00 r4:850d6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8889e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aad840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850d6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85061b8c r4:85061800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85061b8c r4:849cad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d6c00 r8:849cadac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849cad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849cad80 r8:80287e08 r7:e8895e60 r6:849cae00 r5:850d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8889fb0 to 0xe8889ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aad700 INFO: task kworker/0:235:3980 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 80e23000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:236:3984 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:236 state:D stack:0 pid:3984 tgid:3984 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e8899d84 r8:00000002 r7:60000113 r6:e8899d8c r5:850d3c00 r4:850d3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850d3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8899e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aadb00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850d3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd69000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85061f8c r4:85061c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85061f8c r4:849cae80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850d3c00 r8:849caeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:849cae80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:849cae80 r8:80287e08 r7:e8895e60 r6:849caf00 r5:850d3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe8899fb0 to 0xe8899ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aadac0 INFO: task kworker/0:236:3984 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 81205000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:196:3985 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:196 state:D stack:0 pid:3985 tgid:3985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e889dd84 r8:00000002 r7:60000013 r6:e889dd8c r5:83d10000 r4:83d10000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d10000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e889de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b28e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83d10000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfff5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509bf8c r4:8509bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509bf8c r4:84ae8e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d10000 r8:84ae8e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8e00 r8:80287e08 r7:e4871e60 r6:849caf80 r5:83d10000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe889dfb0 to 0xe889dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aae880 INFO: task kworker/1:196:3985 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 81205000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:197:3986 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:197 state:D stack:0 pid:3986 tgid:3986 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88a5d84 r8:00000002 r7:60000113 r6:e88a5d8c r5:83d10c00 r4:83d10c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d10c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b28980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:83d10c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa45000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509b38c r4:8509b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509b38c r4:84ae8e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d10c00 r8:84ae8eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ae8e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ae8e80 r8:80287e08 r7:e889de60 r6:84abd000 r5:83d10c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a5fb0 to 0xe88a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aae880 INFO: task kworker/1:197:3986 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 815e3000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:237:3987 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:237 state:D stack:0 pid:3987 tgid:3987 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88a9d84 r8:00000002 r7:60000013 r6:e88a9d8c r5:83d11800 r4:83d11800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d11800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d11800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85062f8c r4:85062c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85062f8c r4:84abd080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d11800 r8:84abd0ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd080 r8:80287e08 r7:e8895e60 r6:84abd100 r5:83d11800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a9fb0 to 0xe88a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aadd80 INFO: task kworker/0:237:3987 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 815e3000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:238:3989 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:238 state:D stack:0 pid:3989 tgid:3989 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88a1d84 r8:00000002 r7:60000013 r6:e88a1d8c r5:83d12400 r4:83d12400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d12400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88a1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c5bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d12400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506278c r4:85062400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506278c r4:84abd180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d12400 r8:84abd1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd180 r8:80287e08 r7:e88a9e60 r6:84abd200 r5:83d12400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88a1fb0 to 0xe88a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849ddf00 INFO: task kworker/0:238:3989 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 81b6a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:239:3991 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:239 state:D stack:0 pid:3991 tgid:3991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88add84 r8:00000002 r7:60000113 r6:e88add8c r5:83d13000 r4:83d13000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d13000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849ddbc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d13000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85062b8c r4:85062800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85062b8c r4:84abd280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d13000 r8:84abd2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd280 r8:80287e08 r7:e88a9e60 r6:84abd300 r5:83d13000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88adfb0 to 0xe88adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d70c0 INFO: task kworker/0:239:3991 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 81b6a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:240:3992 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:240 state:D stack:0 pid:3992 tgid:3992 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88b5d84 r8:00000002 r7:60000113 r6:e88b5d8c r5:83d13c00 r4:83d13c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d13c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d13c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfedd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506378c r4:85063400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506378c r4:84abd380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d13c00 r8:84abd3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd380 r8:80287e08 r7:e88a9e60 r6:84abd400 r5:83d13c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b5fb0 to 0xe88b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d70c0 INFO: task kworker/0:240:3992 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 81faa000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:241:3995 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:241 state:D stack:0 pid:3995 tgid:3995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88b9d84 r8:00000002 r7:60000013 r6:e88b9d8c r5:83d14800 r4:83d14800 r5:83d14800 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8506338c r4:85063000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:83d14800 r8:84abd4ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:242:3997 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:242 state:D stack:0 pid:3997 tgid:3997 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88c1d84 r8:00000002 r7:60000113 r6:e88c1d8c r5:850e4800 r4:850e4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d78c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0479000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506c38c r4:8506c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506c38c r4:84abd580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e4800 r8:84abd5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd580 r8:80287e08 r7:e88b5e60 r6:84ae8f00 r5:850e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88c1fb0 to 0xe88c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7500 INFO: task kworker/0:242:3997 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8224c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:243:4001 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:243 state:D stack:0 pid:4001 tgid:4001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88b1d84 r8:00000002 r7:60000113 r6:e88b1d8c r5:83d15400 r4:83d15400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d15400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d15400 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85063b8c r4:85063800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85063b8c r4:84abd600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d15400 r8:84abd62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd600 r8:80287e08 r7:e88c1e60 r6:84abd680 r5:83d15400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88b1fb0 to 0xe88b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7780 INFO: task kworker/0:243:4001 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 82635000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:244:4002 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:244 state:D stack:0 pid:4002 tgid:4002 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88bdd84 r8:00000002 r7:60000113 r6:e88bdd8c r5:83d16c00 r4:83d16c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d16c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d16c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffe7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85063f8c r4:85063c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85063f8c r4:84abd700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d16c00 r8:84abd72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd700 r8:80287e08 r7:e88c1e60 r6:84abd780 r5:83d16c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88bdfb0 to 0xe88bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7780 INFO: task kworker/0:244:4002 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 82635000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:245:4003 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:245 state:D stack:0 pid:4003 tgid:4003 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88d1d84 r8:00000002 r7:60000113 r6:e88d1d8c r5:83d16000 r4:83d16000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83d16000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83d16000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e04bd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506c78c r4:8506c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506c78c r4:84abd800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83d16000 r8:84abd82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd800 r8:80287e08 r7:e88c1e60 r6:84abd880 r5:83d16000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d1fb0 to 0xe88d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7780 INFO: task kworker/0:245:4003 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 829cf000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:246:4005 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:246 state:D stack:0 pid:4005 tgid:4005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88c9d84 r8:00000002 r7:60000013 r6:e88c9d8c r5:85040000 r4:85040000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85040000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7d40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85040000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0517000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506cb8c r4:8506c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506cb8c r4:84abd900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85040000 r8:84abd92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abd900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abd900 r8:80287e08 r7:e88d1e60 r6:84abd980 r5:85040000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88c9fb0 to 0xe88c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7b80 INFO: task kworker/0:246:4005 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 82d7b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:247:4007 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:247 state:D stack:0 pid:4007 tgid:4007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88ddd84 r8:00000002 r7:60000113 r6:e88ddd8c r5:850e5400 r4:850e5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849d7b80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0531000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506cf8c r4:8506cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506cf8c r4:84abda00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e5400 r8:84abda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abda00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abda00 r8:80287e08 r7:e88c9e60 r6:84ae8f80 r5:850e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88ddfb0 to 0xe88ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7f80 INFO: task kworker/0:247:4007 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 82d7b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:248:4009 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:248 state:D stack:0 pid:4009 tgid:4009 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88e5d84 r8:00000002 r7:60000013 r6:e88e5d8c r5:850e6c00 r4:850e6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b041c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506d78c r4:8506d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506d78c r4:84abda80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e6c00 r8:84abdaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abda80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abda80 r8:80287e08 r7:e88dde60 r6:84b09000 r5:850e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88e5fb0 to 0xe88e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7dc0 INFO: task kworker/0:248:4009 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 83272000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:249:4010 blocked for more than 457 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:249 state:D stack:0 pid:4010 tgid:4010 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88e9d84 r8:00000002 r7:60000113 r6:e88e9d8c r5:850e6000 r4:850e6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b04040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0557000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506d38c r4:8506d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506d38c r4:84abdb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e6000 r8:84abdb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abdb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abdb00 r8:80287e08 r7:e88e5e60 r6:84b09080 r5:850e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88e9fb0 to 0xe88e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849d7dc0 INFO: task kworker/0:249:4010 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 83272000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:250:4012 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:250 state:D stack:0 pid:4012 tgid:4012 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88f1d84 r8:00000002 r7:60000113 r6:e88f1d8c r5:850e3c00 r4:850e3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b04b40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea953000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506f78c r4:8506f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506f78c r4:84abdb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e3c00 r8:84abdbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abdb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abdb80 r8:80287e08 r7:e88e5e60 r6:84b09100 r5:850e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88f1fb0 to 0xe88f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b04080 INFO: task kworker/0:250:4012 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 83272000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:251:4014 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:251 state:D stack:0 pid:4014 tgid:4014 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea905d84 r8:00000002 r7:60000113 r6:ea905d8c r5:850e8c00 r4:850e8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea905e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b042c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506db8c r4:8506d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506db8c r4:84abdc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850e8c00 r8:84abdc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abdc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abdc00 r8:80287e08 r7:e88f1e60 r6:84b09180 r5:850e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea905fb0 to 0xea905ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b04180 INFO: task kworker/0:251:4014 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 83584000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8506df8c r4:8506dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84abdc80 r8:80287e08 r7:e88f1e60 r6:84b09200 r5:850e8000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8377d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:253:4018 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:253 state:D stack:0 pid:4018 tgid:4018 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea91dd84 r8:00000002 r7:60000113 r6:ea91dd8c r5:850e9800 r4:850e9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850e9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea91de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:850e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:8506e38c r4:8506e000 r10:61c88647 r9:850e9800 r8:84abdd2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84abdd80 r8:80287e08 r7:e88f1e60 r6:84b09300 r5:850ebc00 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 83d00000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:255:4022 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:255 state:D stack:0 pid:4022 tgid:4022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea939d84 r8:00000002 r7:60000013 r6:ea939d8c r5:850eb000 r4:850eb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850eb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea939e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b04780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea92d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506eb8c r4:8506e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84abde00 r8:80287e08 r7:e88f1e60 r6:84b09380 r5:850eb000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8506ef8c r4:84abde80 r10:00000000 r9:84abde80 r8:80287e08 r7:e88f1e60 r6:84b09400 r5:850ea400 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:257 state:D stack:0 pid:4027 tgid:4027 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea951d84 r8:00000002 r7:60000013 r6:ea951d8c r5:850ed400 r4:850ed400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850ed400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea951e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b04a00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea949000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8506f38c r4:8506f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8506f38c r4:84abdf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ed400 r8:84abdf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abdf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abdf00 r8:80287e08 r7:e88f1e60 r6:84b09480 r5:850ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea951fb0 to 0xea951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b04700 INFO: task kworker/0:257:4027 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 84403000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b04c80 r5:8506fb8c r4:8506f800 r10:61c88647 r9:850ee000 r8:84abdfac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abdf80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abdf80 r8:80287e08 r7:e88f1e60 r6:84b09500 r5:850ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea95dfb0 to 0xea95dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b04b80 INFO: task kworker/0:258:4029 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 84403000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0431fb0 to 0xe0431ff8) INFO: task kworker/0:259:4031 blocked for more than 458 seconds. r4:850ec800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850ec800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea969e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b04fc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:850ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea987000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507478c r4:85074400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507478c r4:84b29000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850ec800 r8:84b2902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29000 r8:80287e08 r7:ea95de60 r6:84b09580 r5:850ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8487c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8506ff8c r4:8506fc00 r10:61c88647 r9:850e3000 r8:84b290ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:261:4034 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:261 state:D stack:0 pid:4034 tgid:4034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea97dd84 r8:00000002 r7:60000113 r6:ea97dd8c r5:85100c00 r4:85100c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85100c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea97de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aaeb40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85100c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea971000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507438c r4:85074000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507438c r4:84b29100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r5:85102400 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b28a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85102400 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8509b78c r4:8509b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8509b78c r4:84b09780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85102400 r8:84b097ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b09780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b09780 r8:80287e08 r7:e889de60 r6:84b09800 r5:85102400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea93dfb0 to 0xea93dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b28880 INFO: task kworker/1:198:4042 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 84eec000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:8291a684 r9:e4815d84 r8:00000002 r7:60000113 r6:e4815d8c r5:85103000 r5:00001000 r4:dfc79000 r10:61c88647 r9:85103000 r8:84b098ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:263:4044 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:263 state:D stack:0 pid:4044 tgid:4044 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e484dd84 r8:00000002 r7:60000113 r6:e484dd8c r5:85103c00 r4:85103c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85103c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8507578c r4:85075400 r10:00000000 r9:84b29200 r8:80287e08 r7:ea991e60 r6:84b09980 r5:85103c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:200:4047 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:200 state:D stack:0 pid:4047 tgid:4047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88cdd84 r8:00000002 r7:60000113 r6:e88cdd8c r5:85105400 r4:85105400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85105400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85105400 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 r5:8446d78c r4:8446d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85105400 r8:84b09a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:264:4048 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:264 state:D stack:0 pid:4048 tgid:4048 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea99dd84 r8:00000002 r7:60000113 r6:ea99dd8c r5:85106000 r4:85106000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85106000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea99de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdc580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85106000 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85074f8c r4:85074c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85074f8c r4:84b29280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85106000 r8:84b292ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29280 r8:80287e08 r7:e484de60 r6:84b09b00 r5:85106000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea99dfb0 to 0xea99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdc3c0 INFO: task kworker/0:264:4048 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8567d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:201:4050 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:201 state:D stack:0 pid:4050 tgid:4050 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9a1d84 r8:00000002 r7:60000113 r6:ea9a1d8c r5:85106c00 r4:85106c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85106c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1d040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85106c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0053000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ac38c r4:850ac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ac38c r4:84b09b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85106c00 r8:84b09bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b09b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b09b80 r8:80287e08 r7:e88cde60 r6:84b09c00 r5:85106c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a1fb0 to 0xea9a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 859eb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:202:4051 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:202 state:D stack:0 pid:4051 tgid:4051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea999d84 r8:00000002 r7:60000113 r6:ea999d8c r5:85101800 r4:85101800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85101800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea999e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1d240 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85101800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0085000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ac78c r4:850ac400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ac78c r4:84b09c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85101800 r8:84b09cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b09c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b09c80 r8:80287e08 r7:ea9a1e60 r6:84b09d00 r5:85101800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea999fb0 to 0xea999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1d080 INFO: task kworker/1:202:4051 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 85c66000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:203:4055 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:203 state:D stack:0 pid:4055 tgid:4055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9a5d84 r8:00000002 r7:60000113 r6:ea9a5d8c r5:85108000 r4:85108000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85108000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1d3c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85108000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00ad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850acb8c r4:850ac800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850acb8c r4:84b09d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85108000 r8:84b09dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b09d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b09d80 r8:80287e08 r7:ea999e60 r6:84b09e00 r5:85108000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a5fb0 to 0xea9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1d200 INFO: task kworker/1:203:4055 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 86123000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:204:4056 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:204 state:D stack:0 pid:4056 tgid:4056 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9add84 r8:00000002 r7:60000113 r6:ea9add8c r5:85109800 r4:85109800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85109800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1d880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85109800 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0129000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ad38c r4:850ad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ad38c r4:84b09e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85109800 r8:84b09eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b09e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b09e80 r8:80287e08 r7:ea9a5e60 r6:84b09f00 r5:85109800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9adfb0 to 0xea9adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1d140 INFO: task kworker/1:204:4056 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 863b9000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:265:4058 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:265 state:D stack:0 pid:4058 tgid:4058 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9b1d84 r8:00000002 r7:60000113 r6:ea9b1d8c r5:8510a400 r4:8510a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8510a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdc8c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8510a400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507538c r4:85075000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507538c r4:84b29300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8510a400 r8:84b2932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29300 r8:80287e08 r7:e484de60 r6:84b09f80 r5:8510a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b1fb0 to 0xea9b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdc540 INFO: task kworker/0:265:4058 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8662b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:205:4059 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:205 state:D stack:0 pid:4059 tgid:4059 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9a9d84 r8:00000002 r7:60000113 r6:ea9a9d8c r5:8510b000 r4:8510b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8510b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1d800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8510b000 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0109000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850acf8c r4:850acc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850acf8c r4:84b25000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8510b000 r8:84b2502c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25000 r8:80287e08 r7:ea9ade60 r6:84b25080 r5:8510b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9a9fb0 to 0xea9a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1d7c0 INFO: task kworker/1:205:4059 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8662b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:206:4062 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:206 state:D stack:0 pid:4062 tgid:4062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea995d84 r8:00000002 r7:60000013 r6:ea995d8c r5:85108c00 r4:85108c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85108c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea995e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1dcc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85108c00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e056d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850adb8c r4:850ad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850adb8c r4:84b25100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85108c00 r8:84b2512c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25100 r8:80287e08 r7:ea9ade60 r6:84b25180 r5:85108c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea995fb0 to 0xea995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1d940 INFO: task kworker/1:206:4062 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 867cd000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:207:4063 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:207 state:D stack:0 pid:4063 tgid:4063 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9b5d84 r8:00000002 r7:60000113 r6:ea9b5d8c r5:8510bc00 r4:8510bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8510bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1d980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8510bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e044b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ad78c r4:850ad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ad78c r4:84b25200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8510bc00 r8:84b2522c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25200 r8:80287e08 r7:ea995e60 r6:84b25280 r5:8510bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b5fb0 to 0xea9b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1d940 INFO: task kworker/1:207:4063 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8695e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:208:4066 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:208 state:D stack:0 pid:4066 tgid:4066 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9bdd84 r8:00000002 r7:60000113 r6:ea9bdd8c r5:8510e000 r4:8510e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8510e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1dec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8510e000 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0579000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850adf8c r4:850adc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850adf8c r4:84b25300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8510e000 r8:84b2532c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25300 r8:80287e08 r7:ea995e60 r6:84b25380 r5:8510e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9bdfb0 to 0xea9bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1dc80 INFO: task kworker/1:208:4066 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 86c91000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:209:4068 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:209 state:D stack:0 pid:4068 tgid:4068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9b9d84 r8:00000002 r7:60000013 r6:ea9b9d8c r5:8510c800 r4:8510c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8510c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483a3c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8510c800 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ae38c r4:850ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ae38c r4:84b25400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8510c800 r8:84b2542c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25400 r8:80287e08 r7:ea9bde60 r6:84b25480 r5:8510c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9b9fb0 to 0xea9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1de80 INFO: task kworker/1:209:4068 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 86e6e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:210:4069 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:210 state:D stack:0 pid:4069 tgid:4069 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9c5d84 r8:00000002 r7:60000113 r6:ea9c5d8c r5:8510d400 r4:8510d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8510d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1c7c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8510d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e069d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850aef8c r4:850aec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850aef8c r4:84b25500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8510d400 r8:84b2552c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25500 r8:80287e08 r7:ea9b9e60 r6:84b25580 r5:8510d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c5fb0 to 0xea9c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a440 INFO: task kworker/1:210:4069 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 870fb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:211:4072 blocked for more than 458 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:211 state:D stack:0 pid:4072 tgid:4072 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9cdd84 r8:00000002 r7:60000013 r6:ea9cdd8c r5:85104800 r4:85104800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85104800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1c200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85104800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0655000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850ae78c r4:850ae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850ae78c r4:84b25600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85104800 r8:84b2562c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25600 r8:80287e08 r7:ea9c5e60 r6:84b25680 r5:85104800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9cdfb0 to 0xea9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1c040 INFO: task kworker/1:211:4072 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 87252000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:212:4074 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:212 state:D stack:0 pid:4074 tgid:4074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9d1d84 r8:00000002 r7:60000113 r6:ea9d1d8c r5:850eec00 r4:850eec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:850eec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1c5c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:850eec00 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0689000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850aeb8c r4:850ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850aeb8c r4:84b25700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:850eec00 r8:84b2572c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25700 r8:80287e08 r7:ea9c5e60 r6:84b25780 r5:850eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d1fb0 to 0xea9d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1c1c0 INFO: task kworker/1:212:4074 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 87413000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:266:4076 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:266 state:D stack:0 pid:4076 tgid:4076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9d9d84 r8:00000002 r7:60000013 r6:ea9d9d8c r5:85110c00 r4:85110c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85110c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b12040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85110c00 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfbc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85076b8c r4:85076800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85076b8c r4:84b29380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85110c00 r8:84b293ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29380 r8:80287e08 r7:e484de60 r6:84b25800 r5:85110c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d9fb0 to 0xea9d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdc940 INFO: task kworker/0:266:4076 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 87510000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:213:4078 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:213 state:D stack:0 pid:4078 tgid:4078 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9ddd84 r8:00000002 r7:60000013 r6:ea9ddd8c r5:85110000 r4:85110000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85110000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1c8c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85110000 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850af38c r4:850af000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850af38c r4:84b25880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85110000 r8:84b258ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25880 r8:80287e08 r7:ea9c5e60 r6:84b25900 r5:85110000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9ddfb0 to 0xea9ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1c400 INFO: task kworker/1:213:4078 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 875fd000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:267:4080 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:267 state:D stack:0 pid:4080 tgid:4080 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9e1d84 r8:00000002 r7:60000113 r6:ea9e1d8c r5:85111800 r4:85111800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85111800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdce40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85111800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4844000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85075b8c r4:85075800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85075b8c r4:84b29400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85111800 r8:84b2942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29400 r8:80287e08 r7:ea9d9e60 r6:84b25980 r5:85111800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e1fb0 to 0xea9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdc940 INFO: task kworker/0:267:4080 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 87ad1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:214:4082 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:214 state:D stack:0 pid:4082 tgid:4082 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9d5d84 r8:00000002 r7:60000013 r6:ea9d5d8c r5:85113000 r4:85113000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85113000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1cac0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85113000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0739000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850af78c r4:850af400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850af78c r4:84b25a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85113000 r8:84b25a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25a00 r8:80287e08 r7:ea9dde60 r6:84b25b00 r5:85113000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9d5fb0 to 0xea9d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1c840 INFO: task kworker/1:214:4082 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 87ad1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:215:4084 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:215 state:D stack:0 pid:4084 tgid:4084 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9c1d84 r8:00000002 r7:60000113 r6:ea9c1d8c r5:85113c00 r4:85113c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85113c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850afb8c r4:850af800 r10:61c88647 r9:85113c00 r8:84b25aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25a80 r8:80287e08 r7:ea9d5e60 r6:84b25b80 r5:85113c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c1fb0 to 0xea9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1ca80 INFO: task kworker/1:215:4084 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 87d70000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b0e0c0 task:kworker/1:216 state:D stack:0 pid:4086 tgid:4086 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85114800 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b1cd80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85114800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850aff8c r4:850afc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850aff8c r4:84b25c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85114800 r8:84b25c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25c00 r8:80287e08 r7:ea9c1e60 r6:84b25c80 r5:85114800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9c9fb0 to 0xea9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1cb40 INFO: task kworker/1:216:4086 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 87faa000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:217:4088 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:217 state:D stack:0 pid:4088 tgid:4088 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85115400 r5:85115400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e5e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85115400 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 r5:850f438c r4:850f4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f438c r4:84b25d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85115400 r8:84b25d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25d00 r8:80287e08 r7:ea9c9e60 r6:84b25d80 r5:85115400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e5fb0 to 0xea9e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1ccc0 INFO: task kworker/1:217:4088 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 881c6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:218:4090 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:218 state:D stack:0 pid:4090 tgid:4090 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9e9d84 r8:00000002 r7:60000113 r6:ea9e9d8c r5:85116000 r4:85116000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85116000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2a340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85116000 r7:00000000 r6:83018200 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfad3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507638c r4:85076000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8507638c r4:84b25e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85116000 r8:84b25e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25e00 r8:80287e08 r7:ea9e5e60 r6:84b25e80 r5:85116000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9e9fb0 to 0xea9e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b1ce40 INFO: task kworker/1:218:4090 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 881c6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:219:4092 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:219 state:D stack:0 pid:4092 tgid:4092 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9f5d84 r8:00000002 r7:60000113 r6:ea9f5d8c r5:85112400 r4:85112400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85112400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9f5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2a280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85112400 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e485d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f478c r4:850f4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f478c r4:84b25f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85112400 r8:84b25f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b25f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b25f00 r8:80287e08 r7:ea9e9e60 r6:84b25f80 r5:85112400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9f5fb0 to 0xea9f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2a000 INFO: task kworker/1:219:4092 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 885a7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:268:4093 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:268 state:D stack:0 pid:4093 tgid:4093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa01d84 r8:00000002 r7:60000113 r6:eaa01d8c r5:8510ec00 r4:8510ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8510ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aaee40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8510ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507678c r4:85076400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507678c r4:84b29480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8510ec00 r8:84b294ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29480 r8:80287e08 r7:ea9d9e60 r6:84b18000 r5:8510ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa01fb0 to 0xeaa01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdce00 INFO: task kworker/0:268:4093 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 887d2000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:220:4095 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:220 state:D stack:0 pid:4095 tgid:4095 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea9edd84 r8:00000002 r7:60000113 r6:ea9edd8c r5:85044800 r4:85044800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85044800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea9ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2a400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85044800 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4869000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f4b8c r4:850f4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f4b8c r4:84b18080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85044800 r8:84b180ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b18080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b18080 r8:80287e08 r7:ea9e9e60 r6:84b29500 r5:85044800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea9edfb0 to 0xea9edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2a340 INFO: task kworker/1:220:4095 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8885a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:221:4099 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:221 state:D stack:0 pid:4099 tgid:4099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea915d84 r8:00000002 r7:60000013 r6:ea915d8c r5:85045400 r4:85045400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85045400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea915e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2ae40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85045400 r7:00000000 r6:83018200 r5:00001000 r4:7f06b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e055b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f538c r4:850f5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f538c r4:84b18100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85045400 r8:84b1812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b18100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b18100 r8:80287e08 r7:ea9e9e60 r6:84b29600 r5:85045400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea915fb0 to 0xea915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2a3c0 INFO: task kworker/1:221:4099 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 88a9b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:222:4100 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:222 state:D stack:0 pid:4100 tgid:4100 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea931d84 r8:00000002 r7:60000113 r6:ea931d8c r5:85046c00 r4:85046c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea931e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2ad80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85046c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0525000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f4f8c r4:850f4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f4f8c r4:84b18180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046c00 r8:84b181ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b18180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b18180 r8:80287e08 r7:ea915e60 r6:84b29680 r5:85046c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea931fb0 to 0xea931ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2a3c0 INFO: task kworker/1:222:4100 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 88d2a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:269:4103 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:269 state:D stack:0 pid:4103 tgid:4103 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:e88d5d84 r8:00000002 r7:60000113 r6:e88d5d8c r5:85046000 r4:85046000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85046000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e88d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b121c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85046000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85076f8c r4:85076c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85076f8c r4:84b29700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85046000 r8:84b2972c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29700 r8:80287e08 r7:ea9d9e60 r6:84b29780 r5:85046000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe88d5fb0 to 0xe88d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b12080 INFO: task kworker/0:269:4103 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 88ea2000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:270:4106 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:270 state:D stack:0 pid:4106 tgid:4106 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea961d84 r8:00000002 r7:60000013 r6:ea961d8c r5:85043c00 r4:85043c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85043c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea961e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b12280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85043c00 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507738c r4:85077000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507738c r4:84b29800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85043c00 r8:84b2982c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29800 r8:80287e08 r7:e88d5e60 r6:84b29880 r5:85043c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea961fb0 to 0xea961ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b12180 INFO: task kworker/0:270:4106 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 890c4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:271:4107 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:271 state:D stack:0 pid:4107 tgid:4107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea981d84 r8:00000002 r7:60000013 r6:ea981d8c r5:85042400 r4:85042400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85042400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea981e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b12540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85042400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507778c r4:85077400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507778c r4:84b29900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85042400 r8:84b2992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29900 r8:80287e08 r7:ea961e60 r6:84b29980 r5:85042400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xea981fb0 to 0xea981ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b122c0 INFO: task kworker/0:271:4107 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 890c4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:272:4108 blocked for more than 459 seconds. r5:85043000 r4:8291a680 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85077b8c r4:85077800 r10:61c88647 r9:85043000 r8:84b29a2c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 890c4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:273:4111 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:273 state:D stack:0 pid:4111 tgid:4111 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ea98dd84 r8:00000002 r7:60000013 r6:ea98dd8c r5:85041800 r4:85041800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85041800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea98de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b12780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85041800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe31000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85077f8c r4:85077c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b29b00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r5:80050013 r4:80239bb0 r4:e0431dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:274:4113 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:274 state:D stack:0 pid:4113 tgid:4113 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa09d84 r8:00000002 r7:60000113 r6:eaa09d8c r5:85040c00 r4:85040c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85040c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa09e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b12a00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85040c00 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfec9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507838c r4:85078000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507838c r4:84b29c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85040c00 r8:84b29c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29c00 r8:80287e08 r7:ea98de60 r6:84b29c80 r5:85040c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa09fb0 to 0xeaa09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) r5:80050013 r4:80239bb0 r4:e0431dc0 r5:00001000 r4:e0439000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 task:kworker/0:275 state:D stack:0 pid:4115 tgid:4115 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:dfe7d000 r10:61c88647 r9:85178000 r8:84b29d2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r5:84b4ef8c r4:84b4ec00 r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) r4:84b0e0c0 INFO: task kworker/0:276:4117 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:276 state:D stack:0 pid:4117 tgid:4117 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa11d84 r8:00000002 r7:60000013 r6:eaa11d8c r5:85178c00 r4:85178c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85178c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa11e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b12c40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85178c00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507878c r4:85078400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507878c r4:84b29e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85178c00 r8:84b29e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29e00 r8:80287e08 r7:eaa09e60 r6:84b29e80 r5:85178c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa11fb0 to 0xeaa11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b12a40 INFO: task kworker/0:276:4117 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 89b3d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:277:4119 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:277 state:D stack:0 pid:4119 tgid:4119 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa15d84 r8:00000002 r7:60000013 r6:eaa15d8c r5:85179800 r4:85179800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85179800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa15e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b12d00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85179800 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85078b8c r4:85078800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:8517b000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8517b000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8891000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507978c r4:85079400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507978c r4:84b29580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517b000 r8:84b295ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b29580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b29580 r8:80287e08 r7:eaa15e60 r6:84bec000 r5:8517b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa1dfb0 to 0xeaa1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b12e40 INFO: task kworker/0:278:4120 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 Not tainted 6.15.0-rc7-syzkaller #0 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa05e08 r5:85078f8c r4:85078c00 r10:61c88647 r9:8517c800 r8:84bec0ac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0431d28 to 0xe0431d70) r4:00000000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 1fa0: 00000000 00000000 00000000 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8517a400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4879000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507938c r4:85079000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507938c r4:84bec180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517a400 r8:84bec1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bec180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bec180 r8:80287e08 r7:eaa1de60 r6:84bec200 r5:8517a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa21fb0 to 0xeaa21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aae340 INFO: task kworker/0:280:4124 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8a700000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r10:8291a684 r9:eaa2dd84 r8:00000002 r7:60000113 r6:eaa2dd8c r5:8517bc00 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:224:4129 blocked for more than 459 seconds. r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:850f5b8c r4:850f5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f5b8c r4:84b18280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517ec00 r8:84b182ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b18280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b18280 r8:80287e08 r7:eaa2de60 r6:84bec300 r5:8517ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa35fb0 to 0xeaa35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b2af40 INFO: task kworker/1:224:4129 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8a92f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b0e0c0 r4:85118000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:850f678c r4:850f6400 r10:00000000 r9:84b18300 r8:80287e08 r7:eaa35e60 r6:84b18380 r5:85118000 r4:00000000 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:281:4133 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:281 state:D stack:0 pid:4133 tgid:4133 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa45d84 r8:00000002 r7:60000013 r6:eaa45d8c r5:8511b000 r4:8511b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa45e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85079f8c r4:85079c00 r7:dddced80 r6:83018000 r5:85079f8c r4:84bec380 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:282:4135 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:282 state:D stack:0 pid:4135 tgid:4135 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa4dd84 r8:00000002 r7:60000113 r6:eaa4dd8c r5:8511c800 r4:8511c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa4de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8511c800 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 r5:85079b8c r4:85079800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8511c800 r8:84bec42c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84bec400 r8:80287e08 r7:eaa45e60 r6:84b18480 r5:8511c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa4dfb0 to 0xeaa4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf15c0 INFO: task kworker/0:282:4135 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8b1e8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa55e08 r5:8507a38c r4:8507a000 r7:dddced80 r6:83018000 r5:8507a38c r4:84bec480 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84b4ef8c r4:84b4ec00 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:284:4138 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:284 state:D stack:0 pid:4138 tgid:4138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa59d84 r8:00000002 r7:60000113 r6:eaa59d8c r5:8511d400 r4:8511d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa59e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:8511d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 r5:8507ab8c r4:8507a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84bec500 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d20: 8b966000 e0123000 00000001 80239b98 7f4df000 00000001 r5:00001000 r4:e0439000 r4:84aeca80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1a80 r5:8507a78c r4:8507a400 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf1b80 INFO: task kworker/0:285:4140 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8b966000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:286:4142 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:286 state:D stack:0 pid:4142 tgid:4142 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa6dd84 r8:00000002 r7:60000113 r6:eaa6dd8c r5:8511e000 r4:8511e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa6de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b2af40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8511e000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea965000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507bb8c r4:8507b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507bb8c r4:84bec600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8511e000 r8:84bec62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bec600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bec600 r8:80287e08 r7:eaa59e60 r6:84b18680 r5:8511e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa6dfb0 to 0xeaa6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf1b00 INFO: task kworker/0:286:4142 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8bbaa000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:287:4144 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:287 state:D stack:0 pid:4144 tgid:4144 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa75d84 r8:00000002 r7:60000013 r6:eaa75d8c r5:85118c00 r4:85118c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85118c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa75e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1e00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85118c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea921000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507af8c r4:8507ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507af8c r4:84bec680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85118c00 r8:84bec6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bec680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bec680 r8:80287e08 r7:eaa6de60 r6:84b18700 r5:85118c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa75fb0 to 0xeaa75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf1bc0 INFO: task kworker/0:287:4144 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8bdb4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:288:4146 blocked for more than 459 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:288 state:D stack:0 pid:4146 tgid:4146 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa85d84 r8:00000002 r7:60000013 r6:eaa85d8c r5:8511a400 r4:8511a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa85e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bf1d40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8511a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea933000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507b38c r4:8507b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507b38c r4:84bec700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8511a400 r8:84bec72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bec700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bec700 r8:80287e08 r7:eaa6de60 r6:84b18780 r5:8511a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa85fb0 to 0xeaa85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bf1d40 INFO: task kworker/0:288:4146 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8c26b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa8dd84 r8:00000002 r7:60000113 r6:eaa8dd8c r5:85170000 r4:85170000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85170000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa8de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483a380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85170000 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea947000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8507b78c r4:8507b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507b78c r4:84bec780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85170000 r8:84bec7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84bec780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84bec780 r8:80287e08 r7:eaa6de60 r6:84b18800 r5:85170000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa8dfb0 to 0xeaa8dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a400 INFO: task kworker/0:289:4148 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:00000001 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa91e08 r4:00000000 r5:8514b38c r4:8514b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:226:4152 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:226 state:D stack:0 pid:4152 tgid:4152 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa31d84 r8:00000002 r7:60000113 r6:eaa31d8c r5:85171800 r4:85171800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85171800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:850f638c r4:850f6000 r7:ddde2d80 r6:83018200 r5:850f638c r4:84b18900 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:291:4154 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:291 state:D stack:0 pid:4154 tgid:4154 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa95d84 r8:00000002 r7:60000013 r6:eaa95d8c r5:85172400 r4:85172400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85172400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4f40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85172400 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb2d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b0f8c r4:851b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85172400 r8:84bec8ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:80050013 r4:80239bb0 r4:00000000 r5:84b4ef8c r4:84b4ec00 r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) INFO: task kworker/1:227:4159 blocked for more than 460 seconds. r5:85173000 r4:8291a680 r4:00000000 r9:83018205 r8:85173000 r7:00000000 r6:83018200 r5:00001000 r4:7f02f000 r5:00001000 r4:e0009000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f6f8c r4:850f6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f6f8c r4:84b18a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85173000 r8:84b18aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b18a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b18a80 r8:80287e08 r7:eaa19e60 r6:84b18b00 r5:85173000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaa89fb0 to 0xeaa89ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:80050013 r4:80239bb0 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:228:4160 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:228 state:D stack:0 pid:4160 tgid:4160 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaa25d84 r8:00000002 r7:60000113 r6:eaa25d8c r5:85173c00 r4:85173c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85173c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaa25e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bee300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84b18b80 r8:80287e08 r7:eaa89e60 r6:84b18c00 r5:85173c00 1d60: 80230ad0 80239bb0 80050013 ffffffff r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 task:kworker/0:292 state:D stack:0 pid:4163 tgid:4163 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:851b038c r4:851b0000 dfa0: 00000000 00000000 00000000 00000000 r4:00000000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa1e08 r5:850f778c r4:850f7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f778c r4:84b18d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85175400 r8:84b18d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b18d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b18d00 r8:80287e08 r7:eaa89e60 r6:84b18d80 r5:85175400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa1fb0 to 0xeaaa1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bee4c0 INFO: task kworker/1:229:4164 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8ce48000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 task:kworker/1:230 state:D stack:0 pid:4165 tgid:4165 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:85176000 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 r5:850f738c r4:850f7000 r10:61c88647 r9:85176000 r8:84b18e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b18e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b18e00 r8:80287e08 r7:eaaa1e60 r6:84b18e80 r5:85176000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaa5fb0 to 0xeaaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8483a6c0 INFO: task kworker/1:230:4165 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8d12c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:231:4168 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:231 state:D stack:0 pid:4168 tgid:4168 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaa9d84 r8:00000002 r7:60000113 r6:eaaa9d8c r5:85176c00 r4:85176c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85176c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaa9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be31c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f7b8c r4:850f7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r4:84be3180 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) INFO: task kworker/1:232:4171 blocked for more than 460 seconds. r5:85180000 r4:8291a680 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85180000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e011d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:850f7f8c r4:850f7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:850f7f8c r4:84be8000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85180000 r8:84be802c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8000 r8:80287e08 r7:eaaa9e60 r6:84bec980 r5:85180000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab9fb0 to 0xeaab9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be3100 INFO: task kworker/1:232:4171 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8d3e5000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eaac1d84 r8:00000002 r7:60000113 r6:eaac1d8c r5:85181800 r4:00000000 r4:00000000 r5:84462f8c r4:84462c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84be8080 r8:80287e08 r7:eaab9e60 r6:84beca00 r5:85181800 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be32c0 INFO: task kworker/1:233:4173 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8d5e4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:234:4175 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:234 state:D stack:0 pid:4175 tgid:4175 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaac9d84 r8:00000002 r7:60000113 r6:eaac9d8c r5:85183000 r4:85183000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85183000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaac9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85183000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0577000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514038c r4:85140000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514038c r4:84be8100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85183000 r8:84be812c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8100 r8:80287e08 r7:eaac1e60 r6:84beca80 r5:85183000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaac9fb0 to 0xeaac9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be3400 INFO: task kworker/1:234:4175 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:82ac21e4 r4:e0431dc0 r4:00000000 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85180c00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:85141f8c r4:85141c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85141f8c r4:84be8180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85180c00 r8:84be81ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8180 r8:80287e08 r7:eaac9e60 r6:84becb00 r5:85180c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaacdfb0 to 0xeaacdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be3540 INFO: task kworker/1:235:4176 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8dbb5000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:236:4178 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:236 state:D stack:0 pid:4178 tgid:4178 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaad5d84 r8:00000002 r7:60000113 r6:eaad5d8c r5:85184800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad5e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 5fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:237:4179 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:237 state:D stack:0 pid:4179 tgid:4179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaad9d84 r8:00000002 r7:60000013 r6:eaad9d8c r5:85182400 r4:85182400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85182400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaad9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85182400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85140b8c r4:85140800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:e0677000 r5:85140f8c r4:85140c00 r10:61c88647 r9:85185400 r8:84be832c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84b4ef8c r4:84b4ec00 r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) INFO: task kworker/1:239:4185 blocked for more than 460 seconds. r5:85183c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8514138c r4:85141000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaae9fb0 to 0xeaae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be3ac0 INFO: task kworker/1:239:4185 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8e159000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:240:4186 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:240 state:D stack:0 pid:4186 tgid:4186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: r10:8291a684 r9:eaaedd84 r8:00000002 r7:60000013 r6:eaaedd8c r5:85116c00 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514178c r4:85141400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514178c r4:84be8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84be8400 Exception stack(0xeaaedfb0 to 0xeaaedff8) task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:84b4ef8c r4:84b4ec00 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:241:4187 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:241 state:D stack:0 pid:4187 tgid:4187 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaf1d84 r8:00000002 r7:60000113 r6:eaaf1d8c r5:85186000 r4:85186000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85186000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaf1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84be3d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85186000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e078b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85141b8c r4:85141800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85141b8c r4:84be8480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85186000 r8:84be84ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8480 r8:80287e08 r7:eaacde60 r6:84bece00 r5:85186000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaaf1fb0 to 0xeaaf1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be3b80 INFO: task kworker/1:241:4187 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8e7ce000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:82ac21e4 r4:e0431dc0 r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eab01d84 r8:00000002 r7:60000113 r6:eab01d8c r5:85186c00 r4:85186c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85186c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af5000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85186c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4819000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514238c r4:85142000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514238c r4:84be8500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85186c00 r8:84be852c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8500 r8:80287e08 r7:eaacde60 r6:84bece80 r5:85186c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab01fb0 to 0xeab01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84be3cc0 INFO: task kworker/1:242:4190 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8ea9a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b4ef8c r4:84b4ec00 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Exception stack(0xe0431fb0 to 0xe0431ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8291a684 r9:eab09d84 r8:00000002 r7:60000013 r6:eab09d8c r5:848e0000 r5:848e0000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab09e08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:848e0000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa39000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514338c r4:85143000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514338c r4:84be8580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0000 r8:84be85ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8580 r8:80287e08 r7:eab01e60 r6:84becf00 r5:848e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab09fb0 to 0xeab09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af50c0 INFO: task kworker/1:243:4192 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8ed57000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:244:4193 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:244 state:D stack:0 pid:4193 tgid:4193 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab0dd84 r8:00000002 r7:60000113 r6:eab0dd8c r5:848e0c00 r4:848e0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab0de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af51c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848e0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e485f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514278c r4:85142400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514278c r4:84be8600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e0c00 r8:84be862c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8600 r8:80287e08 r7:eab09e60 r6:84becf80 r5:848e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab0dfb0 to 0xeab0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af5300 INFO: task kworker/1:244:4193 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8ef43000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:245:4195 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:245 state:D stack:0 pid:4195 tgid:4195 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaaadd84 r8:00000002 r7:60000013 r6:eaaadd8c r5:85120c00 r4:85120c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85120c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaaade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:85120c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 r5:85142b8c r4:85142800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84be8680 r8:80287e08 r7:eab09e60 r6:84be8700 r5:85120c00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0431d28 to 0xe0431d70) r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:246:4198 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:246 state:D stack:0 pid:4198 tgid:4198 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab11d84 r8:00000002 r7:60000113 r6:eab11d8c r5:85121800 r4:85121800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85121800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab11e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84af5480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85121800 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85142f8c r4:85142c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85142f8c r4:84be8780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85121800 r8:84be87ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8780 r8:80287e08 r7:eab09e60 r6:84be8800 r5:85121800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab11fb0 to 0xeab11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af5440 INFO: task kworker/1:246:4198 is blocked on a mutex likely owned by task kworker/0:173:3630. Call trace: 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85122400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab15e08 r5:85143b8c r4:85143800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeab15fb0 to 0xeab15ff8) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/1:248:4201 blocked for more than 460 seconds. r5:85123000 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8514378c r4:85143400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514378c r4:84be8980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85123000 r8:84be89ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8980 r8:80287e08 r7:eab15e60 r6:84be8a00 r5:85123000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaab1fb0 to 0xeaab1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af55c0 INFO: task kworker/1:248:4201 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8f514000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:249:4203 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:249 state:D stack:0 pid:4203 tgid:4203 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab1dd84 r8:00000002 r7:60000113 r6:eab1dd8c r5:85123c00 r4:85123c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85123c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85143f8c r4:85143c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85123c00 r8:84be8aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8fa35000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:293:4206 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:293 state:D stack:0 pid:4206 tgid:4206 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851b078c r4:851b0400 r7:dddced80 r6:83018000 r5:851b078c r4:84abb000 r10:00000000 r9:84abb000 r8:80287e08 r7:eaa95e60 r6:84be8b80 r5:85126000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab45fb0 to 0xeab45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849c4440 INFO: task kworker/0:293:4206 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 8fa35000 e0123000 00000001 80239b98 7f4df000 00000001 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r5:84b4ef8c r4:84b4ec00 r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:85124800 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8514878c r4:85148400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85124800 r8:84abb0ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85126c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8514838c r4:85148000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84be8c80 r8:80287e08 r7:eab1de60 r6:84be8d00 r5:85126c00 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:251:4212 blocked for more than 460 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:251 state:D stack:0 pid:4212 tgid:4212 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab31d84 r8:00000002 r7:60000013 r6:eab31d8c r5:85125400 r4:85125400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85125400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab31e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abc140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85125400 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514938c r4:85149000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514938c r4:84be8d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85125400 r8:84be8dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84be8d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84be8d80 r8:80287e08 r7:eab41e60 r6:84be8e00 r5:85125400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab31fb0 to 0xeab31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84af5e00 INFO: task kworker/1:251:4212 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 90553000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:ddde2d80 r6:83018200 r5:85148b8c r4:84be8e80 r10:00000000 r9:84be8e80 r8:80287e08 r7:eab31e60 r6:84be8f00 r5:85120000 Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:295:4215 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:295 state:D stack:0 pid:4215 tgid:4215 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab61d84 r8:00000002 r7:60000013 r6:eab61d8c r5:8511ec00 r4:8511ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8511ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab61e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849c4e80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8511ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851b0b8c r4:851b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b0b8c r4:84abb100 r10:61c88647 r9:8511ec00 r8:84abb12c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:00000001 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:85128000 r4:00000000 r4:00000000 r5:85148f8c r4:85148c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84ab0000 r8:80287e08 r7:eab31e60 r6:84ab0080 r5:85128000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0431fb0 to 0xe0431ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab7d000 r5:8514978c r4:85149400 r7:ddde2d80 r6:83018200 r5:8514978c r4:84ab0100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85128c00 r8:84ab012c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ab0100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab0100 r8:80287e08 r7:eab31e60 r6:84ab0180 r5:85128c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab75fb0 to 0xeab75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84abc100 INFO: task kworker/1:254:4220 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9118d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:255:4222 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:255 state:D stack:0 pid:4222 tgid:4222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab81d84 r8:00000002 r7:60000113 r6:eab81d8c r5:85129800 r4:85129800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85129800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85149b8c r4:85149800 r7:ddde2d80 r6:83018200 r5:85149b8c r4:84ab0200 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:8514a78c r4:84ab0300 r4:00000001 r4:84abc600 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:257:4226 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:257 state:D stack:0 pid:4226 tgid:4226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab95d84 r8:00000002 r7:60000013 r6:eab95d8c r5:8512b000 r4:8512b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8512b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abc6c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8512b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85149f8c r4:85149c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8512b000 r8:84ab042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8514a38c r4:8514a000 r10:61c88647 r9:8512bc00 r8:84ab052c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) r4:82ac21e4 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8512c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaba9e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abcb00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8512c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8514ab8c r4:8514a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514ab8c r4:84ab0600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512c800 r8:84ab062c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ab0600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab0600 r8:80287e08 r7:eab89e60 r6:84ab0680 r5:8512c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaba9fb0 to 0xeaba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84abc9c0 INFO: task kworker/1:259:4230 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 91ca7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:260:4232 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:260 state:D stack:0 pid:4232 tgid:4232 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabb1d84 r8:00000002 r7:60000013 r6:eabb1d8c r5:8512d400 r4:8512d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8512d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabb1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:eabb9000 r5:8514af8c r4:8514ac00 r10:61c88647 r9:8512d400 r8:84ab072c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) r4:82ac21e4 r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:8512e000 r4:8291a680 r4:00000000 r4:00000000 r5:8514bb8c r4:8514b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8514bb8c r4:84ab0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8512e000 r8:84ab082c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84ab0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84ab0800 r8:80287e08 r7:eabb1e60 r6:84ab0880 r5:8512e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabbdfb0 to 0xeabbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84abc9c0 INFO: task kworker/1:261:4234 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9248a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:851b138c r4:851b1000 r10:61c88647 r9:85132400 r8:84abb1ac r7:82804d40 r6:dddced80 r5:dddceda0 Call trace: [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:297:4240 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:297 state:D stack:0 pid:4240 tgid:4240 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabe1d84 r8:00000002 r7:60000113 r6:eabe1d8c r5:85133000 r4:85133000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85133000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabe1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84abcec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85133000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851b1b8c r4:851b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85133000 r8:84abb22c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r4:e0431dc0 r4:84aeca80 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:299:4244 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:299 state:D stack:0 pid:4244 tgid:4244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabf1d84 r8:00000002 r7:60000113 r6:eabf1d8c r5:85133c00 r4:85133c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85133c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabf1e08 r4:00000000 r4:00000000 r5:851b1f8c r4:851b1c00 r4:00000001 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85131800 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeabfdfb0 to 0xeabfdff8) Exception stack(0xe0431d28 to 0xe0431d70) r4:00000000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r5:85134800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e1040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85134800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b278c r4:851b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b278c r4:84abb400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85134800 r8:84abb42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abb400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abb400 r8:80287e08 r7:eabfde60 r6:84ab0b80 r5:85134800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:851b2b8c r4:851b2800 r10:00000000 r9:84abb480 r8:80287e08 r7:eac01e60 r6:84ab0c00 r5:85135400 1d60: 80230ad0 80239bb0 80050013 ffffffff [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85136c00 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8507bf8c r4:8507bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8507bf8c r4:84abb500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85136c00 r8:84abb52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abb500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abb500 r8:80287e08 r7:eac05e60 r6:84ab0c80 r5:85136c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac0dfb0 to 0xeac0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e1280 INFO: task kworker/0:303:4252 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:851b2f8c r4:851b2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:305:4255 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:305 state:D stack:0 pid:4255 tgid:4255 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac19d84 r8:00000002 r7:60000113 r6:eac19d8c r5:85210000 r4:85210000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85210000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac19e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:851b338c r4:851b3000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r5:84b4ef8c r4:84b4ec00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:85210c00 r8:84ab0e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xe0431d28 to 0xe0431d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:851b378c r4:851b3400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:85213c00 r9:83018005 r8:85213c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abb680 r8:80287e08 r7:eac0de60 r6:84ab0f80 r5:85213c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac2dfb0 to 0xeac2dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e1600 INFO: task kworker/0:307:4260 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 95a19000 e0123000 00000001 80239b98 7f4df000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:00000001 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:851b3f8c r4:851b3c00 r7:dddced80 r6:83018000 r5:851b3f8c r4:84abb780 r4:849e16c0 Exception stack(0xe0431d28 to 0xe0431d70) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abb880 r8:80287e08 r7:eac0de60 r6:84abb900 r5:848e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac31fb0 to 0xeac31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e1980 INFO: task kworker/0:309:4265 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 95f6b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:310:4267 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:310 state:D stack:0 pid:4267 tgid:4267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eab6dd84 r8:00000002 r7:60000013 r6:eab6dd8c r5:848e6c00 r4:848e6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eab6de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e1bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea90d000 r5:851b438c r4:851b4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b438c r4:84abb980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e6c00 r8:84abb9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abb980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abb980 r8:80287e08 r7:eac31e60 r6:84abba00 r5:848e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeab6dfb0 to 0xeab6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e1980 INFO: task kworker/0:310:4267 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9645f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b0e0c0 r10:8291a684 r9:eac39d84 r8:00000002 r7:60000113 r6:eac39d8c r5:848e3c00 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851b478c r4:851b4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Not tainted 6.15.0-rc7-syzkaller #0 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:848e1800 r8:84abbbac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:313:4274 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:313 state:D stack:0 pid:4274 tgid:4274 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac49d84 r8:00000002 r7:60000013 r6:eac49d8c r5:848e2400 r4:848e2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848e2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac49e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:849e1f80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848e2400 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea96f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b538c r4:851b5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b538c r4:84abbc80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e2400 r8:84abbcac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abbc80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84abbc80 r8:80287e08 r7:eac31e60 r6:84abbd00 r5:848e2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac49fb0 to 0xeac49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:849e1e80 INFO: task kworker/0:313:4274 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:314:4275 blocked for more than 461 seconds. r5:848e6000 r4:8291a680 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 96bf1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:315:4277 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:315 state:D stack:0 pid:4277 tgid:4277 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac4dd84 r8:00000002 r7:60000113 r6:eac4dd8c r5:8517d400 r4:8517d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8517d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac4de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aeb940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8517d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b5f8c r4:851b5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b5f8c r4:84abbe80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8517d400 r8:84abbeac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84abbe80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 1d20: 96bf1000 e0123000 00000001 80239b98 7f4df000 00000001 r4:e0431dc0 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:851b5b8c r4:851b5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84abbf80 r8:80287e08 r7:eac4de60 r6:84b23000 r5:849b8000 Workqueue: events bpf_prog_free_deferred [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0431dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:263:4281 blocked for more than 461 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:263 state:D stack:0 pid:4281 tgid:4281 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac5dd84 r8:00000002 r7:60000113 r6:eac5dd8c r5:849b9800 r4:849b9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac5de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b06000 r5:8514bf8c r4:8514bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849b9800 r8:84b1002c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:264 state:D stack:0 pid:4283 tgid:4283 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:849ba400 r8:84b100ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe0431d28 to 0xe0431d70) r4:e0431dc0 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac41e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84aebf40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b6b8c r4:851b6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b6b8c r4:84b23180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bb000 r8:84b231ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b23180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b23180 r8:80287e08 r7:eac4de60 r6:84b23200 r5:849bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac41fb0 to 0xeac41ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84aeb840 INFO: task kworker/0:317:4286 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 97a5c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac69000 r5:851b638c r4:851b6000 r7:ddde2d80 r6:83018200 r5:851b638c r4:84b10100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b10100 r8:80287e08 r7:eac61e60 r6:84b23280 r5:849bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac59fb0 to 0xeac59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b06100 INFO: task kworker/1:265:4287 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 97a5c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:318:4289 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r4:849bc800 r5:849bc800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac71e08 r4:00000000 r9:83018005 r8:849bc800 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 r5:851b678c r4:851b6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b678c r4:84b23300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84b23300 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 1d20: 97fb6000 e0123000 00000001 80239b98 7f4df000 00000001 r4:82ac21e4 r4:e0431dc0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:266:4290 blocked for more than 461 seconds. Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eac75d84 r8:00000002 r7:60000113 r6:eac75d8c r5:849bd400 r5:849bd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac75e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fd780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:849bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f113000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515c78c r4:8515c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515c78c r4:84b10180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849bd400 r8:84b101ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b10180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b10180 r8:80287e08 r7:eac61e60 r6:84b23400 r5:849bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac75fb0 to 0xeac75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b060c0 INFO: task kworker/1:266:4290 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 97fb6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eac51d84 r8:00000002 r7:60000113 r6:eac51d8c r5:849be000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:849bec00 r4:8291a680 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851b778c r4:851b7400 r7:dddced80 r6:83018000 r5:851b778c r4:84b23580 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 983fc000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:321:4297 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:321 state:D stack:0 pid:4297 tgid:4297 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eac95d84 r8:00000002 r7:60000113 r6:eac95d8c r5:849b8c00 r4:849b8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eac95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdf000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851b738c r4:851b7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b738c r4:84b23680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b8c00 r8:84b236ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b23680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b23680 r8:80287e08 r7:eac89e60 r6:84b23700 r5:849b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac95fb0 to 0xeac95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdf280 INFO: task kworker/0:321:4297 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0431dc0 r5:00001000 r4:e0439000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:851b7f8c r4:851b7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851b7f8c r4:84b23780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848e3000 r8:84b237ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b23780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b23780 r8:80287e08 r7:eac89e60 r6:84b23800 r5:848e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeac9dfb0 to 0xeac9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdf100 INFO: task kworker/0:322:4299 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 98b54000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:8517e000 r4:8291a680 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851b7b8c r4:851b7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8517e000 r8:84b238ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:324:4303 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851c478c r4:851c4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84b23980 Exception stack(0xeacc1fb0 to 0xeacc1ff8) task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:325:4304 blocked for more than 462 seconds. [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdf600 r5:851c438c r4:851c4000 r10:61c88647 r9:85213000 r8:84b23a2c r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:326:4306 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:326 state:D stack:0 pid:4306 tgid:4306 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacd1d84 r8:00000002 r7:60000113 r6:eacd1d8c r5:85216000 r4:85216000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85216000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacd1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:850831c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85216000 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c638c r4:851c6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c638c r4:84b23a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85216000 r8:84b23aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b23a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b23a80 r8:80287e08 r7:eacc1e60 r6:84b10300 r5:85216000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacd1fb0 to 0xeacd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdf3c0 Workqueue: events bpf_prog_free_deferred 1d20: 9935e000 e0123000 00000001 80239b98 7f4df000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:327:4308 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:327 state:D stack:0 pid:4308 tgid:4308 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eace1d84 r8:00000002 r7:60000013 r6:eace1d8c r5:85211800 r4:85211800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85211800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdf900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85211800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c4b8c r4:851c4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c4b8c r4:84b23b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85211800 r8:84b23b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b23b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b23b00 r8:80287e08 r7:eacd1e60 r6:84b10380 r5:85211800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace1fb0 to 0xeace1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdf6c0 INFO: task kworker/0:327:4308 is blocked on a mutex likely owned by task kworker/0:173:3630. r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 r5:851c4f8c r4:851c4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84bdf840 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:329 state:D stack:0 pid:4312 tgid:4312 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacf5d84 r8:00000002 r7:60000013 r6:eacf5d8c r5:849b0c00 r4:849b0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacf5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84bdfb80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c538c r4:851c5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c538c r4:84b23c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b0c00 r8:84b23cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b23c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b23c80 r8:80287e08 r7:eacd1e60 r6:84b23d00 r5:849b0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeacf5fb0 to 0xeacf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdf980 INFO: task kworker/0:329:4312 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 99a3d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 task:kworker/0:330 state:D stack:0 pid:4315 tgid:4315 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:849b1800 r8:84b23dac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:331:4317 blocked for more than 462 seconds. r10:8291a684 r9:ead09d84 r8:00000002 r7:60000113 r6:ead09d8c r5:849b2400 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851c5b8c r4:851c5800 r7:dddced80 r6:83018000 r5:851c5b8c r4:84b23e80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84bdfe00 INFO: task kworker/0:331:4317 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 99e59000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:332:4318 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:332 state:D stack:0 pid:4318 tgid:4318 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eacb1d84 r8:00000002 r7:60000113 r6:eacb1d8c r5:849b3000 r4:849b3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eacb1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:851c5f8c r4:851c5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:849b3000 r8:84b23fac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ead1dd84 r8:00000002 r7:60000013 r6:ead1dd8c r5:849b5400 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851c6f8c r4:851c6c00 r7:dddced80 r6:83018000 r5:851c6f8c r4:85082080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9a534000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead31e08 r5:851c678c r4:851c6400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:851c6b8c r4:851c6800 r7:dddced80 r6:83018000 r5:851c6b8c r4:85082280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:849b6c00 r8:850822ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85082280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082280 r8:80287e08 r7:ead1de60 r6:85082300 r5:849b6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead11fb0 to 0xead11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85083880 Workqueue: events bpf_prog_free_deferred r4:e0431dc0 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead45e08 r9:83018005 r8:851a0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r4:00000001 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:337:4331 blocked for more than 462 seconds. r10:8291a684 r9:ead59d84 r8:00000002 r7:60000113 r6:ead59d8c r5:851a3000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:851d038c r4:851d0000 r7:dddced80 r6:83018000 r5:851d038c r4:85082480 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9ad81000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:338:4332 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:338 state:D stack:0 pid:4332 tgid:4332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead61d84 r8:00000002 r7:60000113 r6:ead61d8c r5:851a1800 r4:851a1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead61e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85083ac0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a1800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851c778c r4:851c7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851c778c r4:85082580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a1800 r8:850825ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85082580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:850839c0 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r4:e0431dc0 r4:00000000 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r5:84b4ef8c r4:84b4ec00 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:84b0e0c0 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:851a3c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:851c7b8c r4:851c7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082680 r8:80287e08 r7:ead59e60 r6:85082700 r5:851a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead69fb0 to 0xead69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85083c00 INFO: task kworker/0:339:4333 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9b3e0000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:340:4335 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:340 state:D stack:0 pid:4335 tgid:4335 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead6dd84 r8:00000002 r7:60000013 r6:ead6dd8c r5:851a0000 r4:851a0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead6de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:851c7f8c r4:851c7c00 r7:dddced80 r6:83018000 r5:851c7f8c r4:85082780 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ead71d84 r8:00000002 r7:60000013 r6:ead71d8c r5:851a4800 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:851d0b8c r4:851d0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0431dc0 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:342:4339 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:342 state:D stack:0 pid:4339 tgid:4339 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead81d84 r8:00000002 r7:60000013 r6:ead81d8c r5:851a6000 r4:851a6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508a380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a6000 r7:00000000 r6:83018000 r5:00001000 r4:7f0dd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d078c r4:851d0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d078c r4:85082980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a6000 r8:850829ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85082980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082980 r8:80287e08 r7:ead71e60 r6:85082a00 r5:851a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead81fb0 to 0xead81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508a340 INFO: task kworker/0:342:4339 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9c03e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ead87000 r5:851d0f8c r4:851d0c00 r10:61c88647 r9:851a6c00 r8:85082aac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xead41fb0 to 0xead41ff8) task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9c692000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:344:4343 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:344 state:D stack:0 pid:4343 tgid:4343 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead95d84 r8:00000002 r7:60000113 r6:ead95d8c r5:849b3c00 r4:849b3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508abc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead9f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d178c r4:851d1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d178c r4:85082b80 r10:61c88647 r9:849b3c00 r8:85082bac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:345:4344 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:345 state:D stack:0 pid:4344 tgid:4344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead9dd84 r8:00000002 r7:60000113 r6:ead9dd8c r5:849b4800 r4:849b4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:849b4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead9de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508a980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:849b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0e3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d138c r4:851d1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d138c r4:85082c80 r10:61c88647 r9:849b4800 r8:85082cac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:00000000 Exception stack(0xe0431d28 to 0xe0431d70) r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 r4:85208000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eada9e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:851d1b8c r4:851d1800 r4:85082d80 Exception stack(0xeada9fb0 to 0xeada9ff8) task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:347:4349 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:347 state:D stack:0 pid:4349 tgid:4349 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ead91d84 r8:00000002 r7:60000113 r6:ead91d8c r5:85208c00 r4:85208c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85208c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ead91e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8508ae40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85208c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0e9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadb3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d1f8c r4:851d1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d1f8c r4:85082e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85208c00 r8:85082eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85082e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85082e80 r8:80287e08 r7:eada9e60 r6:85082f00 r5:85208c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xead91fb0 to 0xead91ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8508aa40 INFO: task kworker/0:347:4349 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b4ef8c r4:84b4ec00 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:84b0e0c0 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:85209800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85209800 r8:85082fac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:349:4353 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:349 state:D stack:0 pid:4353 tgid:4353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadb1d84 r8:00000002 r7:60000113 r6:eadb1d8c r5:8520a400 r4:8520a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadb1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7240 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ed000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d278c r4:851d2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d278c r4:851e6080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520a400 r8:851e60ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6080 r8:80287e08 r7:eadbde60 r6:851e6100 r5:8520a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadb1fb0 to 0xeadb1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e7000 INFO: task kworker/0:349:4353 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9d57e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:350:4356 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:350 state:D stack:0 pid:4356 tgid:4356 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadc5d84 r8:00000002 r7:60000113 r6:eadc5d8c r5:8520b000 r4:8520b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadc5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eadcd000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:351:4358 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:351 state:D stack:0 pid:4358 tgid:4358 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadd9d84 r8:00000002 r7:60000113 r6:eadd9d8c r5:8520bc00 r4:8520bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadd9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d2f8c r4:851d2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r4:00000000 r5:00001000 r4:e0439000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:352:4359 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r5:8520c800 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eade1000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:353:4362 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:353 state:D stack:0 pid:4362 tgid:4362 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eade5d84 r8:00000002 r7:60000013 r6:eade5d8c r5:8520d400 r4:8520d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eade5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d378c r4:851d3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d378c r4:851e6480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520d400 r8:851e64ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6480 r8:80287e08 r7:eadd1e60 r6:851e6500 r5:8520d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeade5fb0 to 0xeade5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e75c0 INFO: task kworker/0:353:4362 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9e1fe000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e0431dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r5:00001000 r4:e0439000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eae0f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: 9e6f4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:355:4365 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:355 state:D stack:0 pid:4365 tgid:4365 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eadedd84 r8:00000002 r7:60000113 r6:eadedd8c r5:8520ec00 r4:8520ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8520ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eadede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8520ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0f7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d3b8c r4:851d3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d3b8c r4:851e6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8520ec00 r8:851e672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6700 r8:80287e08 r7:eadf9e60 r6:851e6780 r5:8520ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeadedfb0 to 0xeadedff8) dfa0: 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/0:356:4367 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:356 state:D stack:0 pid:4367 tgid:4367 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae0dd84 r8:00000002 r7:60000013 r6:eae0dd8c r5:851a5400 r4:851a5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:851a5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae0de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851e7a40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a5400 r7:00000000 r6:83018000 r5:00001000 r4:7f0f9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d3f8c r4:851d3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d3f8c r4:851e6580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a5400 r8:851e65ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6580 r8:80287e08 r7:eadf9e60 r6:851e6800 r5:851a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae0dfb0 to 0xeae0dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e7a80 INFO: task kworker/0:356:4367 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9eff1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:eae15000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d878c r4:851d8400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d8f8c r4:851d8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d8f8c r4:851e6980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524a400 r8:851e69ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6980 r8:80287e08 r7:eae19e60 r6:851e6a00 r5:8524a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae21fb0 to 0xeae21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e7fc0 INFO: task kworker/0:358:4371 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9eff1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:359:4372 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:359 state:D stack:0 pid:4372 tgid:4372 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae2dd84 r8:00000002 r7:60000113 r6:eae2dd8c r5:85248000 r4:85248000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85248000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae2de08 r5:00001000 r4:eae23000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xeae2dfb0 to 0xeae2dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e0431dc0 r5:00001000 r4:e0439000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae01e08 r5:00001000 r4:eae41000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:851e6b80 r8:80287e08 r7:eae21e60 r6:851e6c00 r5:8524b000 r4:851f5380 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9f596000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:361:4376 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:361 state:D stack:0 pid:4376 tgid:4376 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae31d84 r8:00000002 r7:60000013 r6:eae31d8c r5:8524bc00 r4:8524bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8524bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae31e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5240 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f103000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d938c r4:851d9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d938c r4:851e6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524bc00 r8:851e6cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6c80 r8:80287e08 r7:eae01e60 r6:851e6d00 r5:8524bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae31fb0 to 0xeae31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5480 INFO: task kworker/0:361:4376 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9fbbb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:362:4379 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:362 state:D stack:0 pid:4379 tgid:4379 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae39d84 r8:00000002 r7:60000113 r6:eae39d8c r5:8524c800 r4:8524c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8524c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae39e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524c800 r7:00000000 r6:83018000 r5:00001000 r4:7f107000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d9b8c r4:851d9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d9b8c r4:851e6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524c800 r8:851e6dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6d80 r8:80287e08 r7:eae01e60 r6:851e6e00 r5:8524c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae39fb0 to 0xeae39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5540 INFO: task kworker/0:362:4379 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: 9fc9f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:363:4381 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:363 state:D stack:0 pid:4381 tgid:4381 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae4dd84 r8:00000002 r7:60000013 r6:eae4dd8c r5:8524d400 r4:8524d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8524d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae4de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524d400 r7:00000000 r6:83018000 r5:00001000 r4:7f109000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae55000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851d9f8c r4:851d9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851d9f8c r4:851e6e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524d400 r8:851e6eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6e80 r8:80287e08 r7:eae39e60 r6:851e6f00 r5:8524d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae4dfb0 to 0xeae4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5900 INFO: task kworker/0:363:4381 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a017c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:364:4383 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:364 state:D stack:0 pid:4383 tgid:4383 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae59d84 r8:00000002 r7:60000013 r6:eae59d8c r5:8524e000 r4:8524e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8524e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae59e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fd400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8524e000 r7:00000000 r6:83018000 r5:00001000 r4:7f10d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515c38c r4:8515c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515c38c r4:851e6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8524e000 r8:851e6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:851e6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:851e6f80 r8:80287e08 r7:eae4de60 r6:85200000 r5:8524e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae59fb0 to 0xeae59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5780 INFO: task kworker/0:364:4383 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a017c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:365:4384 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:365 state:D stack:0 pid:4384 tgid:4384 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae75d84 r8:00000002 r7:60000013 r6:eae75d8c r5:85215400 r4:85215400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85215400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae75e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5a40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85215400 r7:00000000 r6:83018000 r5:00001000 r4:7f10b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851da38c r4:851da000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851da38c r4:85200080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85215400 r8:852000ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200080 r8:80287e08 r7:eae59e60 r6:84b10400 r5:85215400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae75fb0 to 0xeae75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5980 INFO: task kworker/0:365:4384 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a017c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:366:4387 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:366 state:D stack:0 pid:4387 tgid:4387 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae81d84 r8:00000002 r7:60000013 r6:eae81d8c r5:85216c00 r4:85216c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85216c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5c00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85216c00 r7:00000000 r6:83018000 r5:00001000 r4:7f10f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851da78c r4:851da400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851da78c r4:85200100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85216c00 r8:8520012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200100 r8:80287e08 r7:eae59e60 r6:84b10480 r5:85216c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae81fb0 to 0xeae81ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5b40 INFO: task kworker/0:366:4387 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a0a45000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:367:4389 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:367 state:D stack:0 pid:4389 tgid:4389 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae95d84 r8:00000002 r7:60000013 r6:eae95d8c r5:85130c00 r4:85130c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85130c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85130c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc5b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851daf8c r4:851dac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851daf8c r4:85200180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85130c00 r8:852001ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200180 r8:80287e08 r7:eae81e60 r6:84b10500 r5:85130c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae95fb0 to 0xeae95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5a00 INFO: task kworker/0:367:4389 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a0b15000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:368:4391 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:368 state:D stack:0 pid:4391 tgid:4391 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae99d84 r8:00000002 r7:60000113 r6:eae99d8c r5:85136000 r4:85136000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85136000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae99e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85136000 r7:00000000 r6:83018000 r5:00001000 r4:7f111000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851dab8c r4:851da800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851dab8c r4:85200200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85136000 r8:8520022c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200200 r8:80287e08 r7:eae95e60 r6:84b10580 r5:85136000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae99fb0 to 0xeae99ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5a00 INFO: task kworker/0:368:4391 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a0b15000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:369:4393 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:369 state:D stack:0 pid:4393 tgid:4393 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae69d84 r8:00000002 r7:60000113 r6:eae69d8c r5:85198000 r4:85198000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85198000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae69e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f61c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85198000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0037000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851db38c r4:851db000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851db38c r4:85200280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198000 r8:852002ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200280 r8:80287e08 r7:eae95e60 r6:84b10600 r5:85198000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae69fb0 to 0xeae69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5f40 INFO: task kworker/0:369:4393 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a107e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:370:4398 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:370 state:D stack:0 pid:4398 tgid:4398 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaae1d84 r8:00000002 r7:60000113 r6:eaae1d8c r5:85198c00 r4:85198c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85198c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaae1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85198c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0087000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851db78c r4:851db400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851db78c r4:85200300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85198c00 r8:8520032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200300 r8:80287e08 r7:eae69e60 r6:84b10680 r5:85198c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaae1fb0 to 0xeaae1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f6180 INFO: task kworker/0:370:4398 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a107e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:371:4399 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:371 state:D stack:0 pid:4399 tgid:4399 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eae45d84 r8:00000002 r7:60000013 r6:eae45d8c r5:85199800 r4:85199800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85199800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eae45e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85199800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0107000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851dbb8c r4:851db800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851dbb8c r4:85200380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85199800 r8:852003ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200380 r8:80287e08 r7:eaae1e60 r6:84b10700 r5:85199800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeae45fb0 to 0xeae45ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f6180 INFO: task kworker/0:371:4399 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a1609000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:267:4401 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:267 state:D stack:0 pid:4401 tgid:4401 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaea9d84 r8:00000002 r7:60000113 r6:eaea9d8c r5:8519a400 r4:8519a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaea9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fdec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8519a400 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0583000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515d38c r4:8515d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515d38c r4:84b10780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519a400 r8:84b107ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b10780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b10780 r8:80287e08 r7:eac61e60 r6:84b10800 r5:8519a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea9fb0 to 0xeaea9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851fda40 INFO: task kworker/1:267:4401 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a1609000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:00000000 r5:84b4ef8c r4:84b4ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515eb8c r4:8515e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:851dbf8c r4:851dbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:851dbf8c r4:85200400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519bc00 r8:8520042c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200400 r8:80287e08 r7:eae45e60 r6:84b10980 r5:8519bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaed1fb0 to 0xeaed1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f64c0 INFO: task kworker/0:372:4404 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a1b90000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:373:4406 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:373 state:D stack:0 pid:4406 tgid:4406 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaeedd84 r8:00000002 r7:60000113 r6:eaeedd8c r5:8519c800 r4:8519c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaeede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8519c800 r8:852004ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200480 r8:80287e08 r7:eaed1e60 r6:84b10a00 r5:8519c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaeedfb0 to 0xeaeedff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f65c0 INFO: task kworker/0:373:4406 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a1b90000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:374:4408 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:374 state:D stack:0 pid:4408 tgid:4408 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaed5d84 r8:00000002 r7:60000013 r6:eaed5d8c r5:8519d400 r4:8519d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8519d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527878c r4:85278400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: a1b90000 e0123000 00000001 80239b98 7f4df000 00000001 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:269:4410 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851fdf40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8519e000 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e062f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527838c r4:85278000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8527838c r4:84b10b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519e000 r8:84b10b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b10b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b10b00 r8:80287e08 r7:eaecde60 r6:84b10b80 r5:8519e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaea5fb0 to 0xeaea5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0439000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf0de08 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85278f8c r4:85278c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85200580 r8:80287e08 r7:eaeede60 r6:84b10c00 r5:84850c00 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:00000000 r5:00001000 r4:e0439000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:270 state:D stack:0 pid:4415 tgid:4415 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf15d84 r8:00000002 r7:60000113 r6:eaf15d8c r5:84852400 r4:84852400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84852400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf15e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851faf80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84852400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515d78c r4:8515d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515d78c r4:84b10c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84852400 r8:84b10cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:84b10c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84b10c80 r8:80287e08 r7:eaecde60 r6:84b10d00 r5:84852400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf15fb0 to 0xeaf15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851fa180 INFO: task kworker/1:270:4415 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a2634000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:376:4416 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:376 state:D stack:0 pid:4416 tgid:4416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf19d84 r8:00000002 r7:60000113 r6:eaf19d8c r5:84853000 r4:84853000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84853000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf19e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483a7c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84853000 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85279f8c r4:85279c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85279f8c r4:85200600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84853000 r8:8520062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200600 r8:80287e08 r7:eaf0de60 r6:84b10d80 r5:84853000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf19fb0 to 0xeaf19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f6c00 INFO: task kworker/0:376:4416 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a2dfb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:377:4417 blocked for more than 462 seconds. Workqueue: events bpf_prog_free_deferred r4:84850000 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6e00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84850000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4817000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527938c r4:85279000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527938c r4:85200680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84850000 r8:852006ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200680 r8:80287e08 r7:eaf19e60 r6:84b10e00 r5:84850000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf1dfb0 to 0xeaf1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f6c00 INFO: task kworker/0:377:4417 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a2dfb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:378:4419 blocked for more than 462 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:378 state:D stack:0 pid:4419 tgid:4419 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf31d84 r8:00000002 r7:60000113 r6:eaf31d8c r5:84851800 r4:84851800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84851800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf31e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84851800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 r5:00001000 r4:e4867000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527978c r4:85279400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:85200700 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf31fb0 to 0xeaf31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f6d40 INFO: task kworker/0:378:4419 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a3380000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:379:4421 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:379 state:D stack:0 pid:4421 tgid:4421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf39d84 r8:00000002 r7:60000013 r6:eaf39d8c r5:84853c00 r4:84853c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84853c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf39e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f6980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84853c00 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea983000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85279b8c r4:85279800 r10:61c88647 r9:84853c00 r8:852007ac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeaf39fb0 to 0xeaf39ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe0431fb0 to 0xe0431ff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eaf45d84 r8:00000002 r7:60000013 r6:eaf45d8c r5:84854800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r4:851f6900 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a3f23000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:381:4426 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:381 state:D stack:0 pid:4426 tgid:4426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf4dd84 r8:00000002 r7:60000113 r6:eaf4dd8c r5:84856000 r4:84856000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84856000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf4de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:851f5e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84856000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaab5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527a78c r4:8527a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527a78c r4:85200880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84856000 r8:852008ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200880 r8:80287e08 r7:eaf45e60 r6:852b5000 r5:84856000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf4dfb0 to 0xeaf4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851f5ec0 INFO: task kworker/0:381:4426 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a3f23000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:382:4427 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:382 state:D stack:0 pid:4427 tgid:4427 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaef1d84 r8:00000002 r7:60000113 r6:eaef1d8c r5:8524ec00 r4:8524ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8524ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaef1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852055c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeaef1fb0 to 0xeaef1ff8) r4:851f5ec0 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ab8c r4:8527a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527ab8c r4:85200a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85249800 r8:85200a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200a00 r8:80287e08 r7:eaef1e60 r6:85200a80 r5:85249800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf49fb0 to 0xeaf49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851e7f00 INFO: task kworker/0:383:4429 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a4294000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf51e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85205100 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:851a2400 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaad1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527af8c r4:8527ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527af8c r4:85200b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:851a2400 r8:85200b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200b00 r8:80287e08 r7:eaef1e60 r6:85200b80 r5:851a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf51fb0 to 0xeaf51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85205140 INFO: task kworker/0:384:4432 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a4294000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) INFO: task kworker/0:385:4433 blocked for more than 463 seconds. r5:84856c00 r4:8291a680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84856c00 r8:85200c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200c00 r8:80287e08 r7:eaef1e60 r6:852b5080 r5:84856c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf5dfb0 to 0xeaf5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85205440 INFO: task kworker/0:385:4433 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a4797000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b4ef8c r4:84b4ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eab17000 r5:8527b78c r4:8527b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85218000 r8:85200cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85205240 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:00001000 r4:e0439000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:387:4438 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:387 state:D stack:0 pid:4438 tgid:4438 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf65d84 r8:00000002 r7:60000113 r6:eaf65d8c r5:85218c00 r4:85218c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85218c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf65e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85205880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85218c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527c38c r4:8527c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527c38c r4:85200d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85218c00 r8:85200d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200d00 r8:80287e08 r7:eaef1e60 r6:852b5180 r5:85218c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf65fb0 to 0xeaf65ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85205700 INFO: task kworker/0:387:4438 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a4797000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe0431fb0 to 0xe0431ff8) INFO: task kworker/1:271:4440 blocked for more than 463 seconds. r4:85219800 r4:00000000 r4:00000000 r5:8515db8c r4:8515d800 r7:ddde2d80 r6:83018200 r5:8515db8c r4:852b5200 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:388:4442 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:388 state:D stack:0 pid:4442 tgid:4442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:8521a400 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8527bf8c r4:8527bc00 r7:dddced80 r6:83018000 r5:8527bf8c r4:85200d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521a400 r8:85200dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200d80 r8:80287e08 r7:eaf65e60 r6:852b5300 r5:8521a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf6dfb0 to 0xeaf6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0431d28 to 0xe0431d70) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:8291a684 r9:eaf75d84 r8:00000002 r7:60000113 r6:eaf75d8c r5:8521bc00 r5:8527c78c r4:8527c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8521bc00 r8:85200e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85200e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85200e00 r8:80287e08 r7:eaf65e60 r6:852b5380 r5:8521bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf75fb0 to 0xeaf75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852057c0 INFO: task kworker/0:389:4444 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a51bf000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8527cb8c r4:8527c800 r7:dddced80 r6:83018000 r5:8527cb8c r4:85200e80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Exception stack(0xe0431fb0 to 0xe0431ff8) task:kworker/0:391 state:D stack:0 pid:4447 tgid:4447 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r5:8527d78c r4:8527d400 r7:dddced80 r6:83018000 r5:8527d78c r4:85200f00 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:392 state:D stack:0 pid:4449 tgid:4449 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:eab6f000 r5:8527cf8c r4:8527cc00 r10:00000000 r9:85200f80 r8:80287e08 r7:eaf81e60 r6:852b5500 r5:8521c800 Exception stack(0xe0431d28 to 0xe0431d70) r5:00001000 r4:e0439000 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf91e08 r5:8527d38c r4:8527d000 r4:852bc000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a588e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:394 state:D stack:0 pid:4453 tgid:4453 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eaf95d84 r8:00000002 r7:60000113 r6:eaf95d8c r5:8521ec00 r4:8521ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85205e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527db8c r4:8527d800 r7:dddced80 r6:83018000 r5:8527db8c r4:852bc080 r4:852bc080 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) 1d60: 80230ad0 80239bb0 80050013 ffffffff [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eafa1d84 r8:00000002 r7:60000113 r6:eafa1d8c r5:85220c00 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8527e38c r4:8527e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:852bc100 r8:80287e08 r7:eaf95e60 r6:852b5680 r5:85220c00 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:396:4458 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:396 state:D stack:0 pid:4458 tgid:4458 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafa5d84 r8:00000002 r7:60000113 r6:eafa5d8c r5:85221800 r4:85221800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85221800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafa5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85221800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527df8c r4:8527dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527df8c r4:852bc180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85221800 r8:852bc1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc180 r8:80287e08 r7:eafa1e60 r6:852b5700 r5:85221800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafa5fb0 to 0xeafa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:851fae80 INFO: task kworker/0:396:4458 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:00000000 r5:00001000 r4:e0439000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:397:4460 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:397 state:D stack:0 pid:4460 tgid:4460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafadd84 r8:00000002 r7:60000013 r6:eafadd8c r5:85223000 r4:85223000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85223000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85223000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaedb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ef8c r4:8527ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527ef8c r4:852bc200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85223000 r8:852bc22c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc200 r8:80287e08 r7:eafa1e60 r6:852b5780 r5:85223000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafadfb0 to 0xeafadff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4100 INFO: task kworker/0:397:4460 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a60a3000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:398:4462 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:398 state:D stack:0 pid:4462 tgid:4462 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb5d84 r8:00000002 r7:60000113 r6:eafb5d8c r5:85222400 r4:85222400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85222400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c42c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85222400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaeab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527e78c r4:8527e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527e78c r4:852bc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85222400 r8:852bc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc280 r8:80287e08 r7:eafade60 r6:852b5800 r5:85222400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafb5fb0 to 0xeafb5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4180 INFO: task kworker/0:398:4462 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a6773000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:399:4464 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:399 state:D stack:0 pid:4464 tgid:4464 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafbdd84 r8:00000002 r7:60000013 r6:eafbdd8c r5:85224800 r4:85224800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85224800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafbde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4440 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85224800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527eb8c r4:8527e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527eb8c r4:852bc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85224800 r8:852bc32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc300 r8:80287e08 r7:eafade60 r6:852b5880 r5:85224800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafbdfb0 to 0xeafbdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4240 INFO: task kworker/0:399:4464 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a6773000 e0123000 00000001 80239b98 7f4df000 00000001 1d60: 80230ad0 80239bb0 80050013 ffffffff [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:272:4466 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:272 state:D stack:0 pid:4466 tgid:4466 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafc1d84 r8:00000002 r7:60000113 r6:eafc1d8c r5:85223c00 r4:85223c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85223c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafc1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85223c00 r7:00000000 r6:83018200 r5:00001000 r4:7f115000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515df8c r4:8515dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515df8c r4:852b5900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85223c00 r8:852b592c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b5900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5900 r8:80287e08 r7:eaecde60 r6:852b5980 r5:85223c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc1fb0 to 0xeafc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2b00 INFO: task kworker/1:272:4466 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a6773000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:00001000 r4:e0439000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:84aeca80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85225400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 r5:00001000 r4:eaf1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527f38c r4:8527f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527f38c r4:852bc380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85225400 r8:852bc3ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc380 r8:80287e08 r7:eafade60 r6:852b5a00 r5:85225400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafc5fb0 to 0xeafc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4500 INFO: task kworker/0:400:4468 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a684a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:85226000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8528038c r4:85280000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85226000 r8:852bc42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c44c0 INFO: task kworker/0:401:4470 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a6bdb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:402:4471 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:402 state:D stack:0 pid:4471 tgid:4471 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafb9d84 r8:00000002 r7:60000013 r6:eafb9d8c r5:8496a400 r4:8496a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafb9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8496a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8527f78c r4:8527f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527f78c r4:852bc480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496a400 r8:852bc4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 9fa0: 00000000 00000000 00000000 00000000 r4:852c4940 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:273:4474 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:273 state:D stack:0 pid:4474 tgid:4474 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf05d84 r8:00000002 r7:60000113 r6:eaf05d8c r5:85226c00 r4:85226c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85226c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf05e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853388c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85226c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515e78c r4:8515e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515e78c r4:852b5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85226c00 r8:852b5b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852b5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852b5b00 r8:80287e08 r7:eaecde60 r6:852b5b80 r5:85226c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf05fb0 to 0xeaf05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c2c80 INFO: task kworker/1:273:4474 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a6f36000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:403:4476 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:403 state:D stack:0 pid:4476 tgid:4476 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe1d84 r8:00000002 r7:60000113 r6:eafe1d8c r5:85220000 r4:85220000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85220000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c49c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85220000 r7:00000000 r6:83018000 r5:00001000 r4:7f117000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527fb8c r4:8527f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527fb8c r4:852bc580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85220000 r8:852bc5ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc580 r8:80287e08 r7:eafcde60 r6:852b5c00 r5:85220000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe1fb0 to 0xeafe1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c46c0 INFO: task kworker/0:403:4476 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a6f36000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:404:4477 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:404 state:D stack:0 pid:4477 tgid:4477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eafe5d84 r8:00000002 r7:60000113 r6:eafe5d8c r5:8521b000 r4:8521b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8521b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eafe5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4b40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8521b000 r7:00000000 r6:83018000 r5:00001000 r4:7f119000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8527ff8c r4:8527fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8527ff8c r4:852bc600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8521b000 r8:852bc62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc600 r8:80287e08 r7:eafcde60 r6:852b5c80 r5:8521b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeafe5fb0 to 0xeafe5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c46c0 INFO: task kworker/0:404:4477 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a739b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:405:4480 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:405 state:D stack:0 pid:4480 tgid:4480 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabc5d84 r8:00000002 r7:60000113 r6:eabc5d8c r5:85229800 r4:85229800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85229800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabc5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c2280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85229800 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfd21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85280f8c r4:85280c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85280f8c r4:852bc680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85229800 r8:852bc6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc680 r8:80287e08 r7:eafcde60 r6:852b5d00 r5:85229800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabc5fb0 to 0xeabc5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4bc0 INFO: task kworker/0:405:4480 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a739b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:406:4482 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:406 state:D stack:0 pid:4482 tgid:4482 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd5d84 r8:00000002 r7:60000113 r6:eabd5d8c r5:85228000 r4:85228000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85228000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4d40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85228000 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df9f5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528078c r4:85280400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528078c r4:852bc700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85228000 r8:852bc72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc700 r8:80287e08 r7:eabc5e60 r6:852b5d80 r5:85228000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd5fb0 to 0xeabd5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4cc0 INFO: task kworker/0:406:4482 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a7751000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:407:4483 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:407 state:D stack:0 pid:4483 tgid:4483 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eace5d84 r8:00000002 r7:60000113 r6:eace5d8c r5:8522b000 r4:8522b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eace5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852c4ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522b000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85280b8c r4:85280800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85280b8c r4:852bc780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522b000 r8:852bc7ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc780 r8:80287e08 r7:eabc5e60 r6:852b5e00 r5:8522b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeace5fb0 to 0xeace5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c4cc0 INFO: task kworker/0:407:4483 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a7a64000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r5:84b4ef8c r4:84b4ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:408:4486 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:408 state:D stack:0 pid:4486 tgid:4486 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb005d84 r8:00000002 r7:60000113 r6:eb005d8c r5:8522a400 r4:8522a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb005e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85205dc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522a400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfde3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528138c r4:85281000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528138c r4:852bc800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522a400 r8:852bc82c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc800 r8:80287e08 r7:eabc5e60 r6:852b5e80 r5:8522a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb005fb0 to 0xeb005ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85205fc0 INFO: task kworker/0:408:4486 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a7c3a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0431fb0 to 0xe0431ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:409 state:D stack:0 pid:4488 tgid:4488 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:00001000 r4:e88c5000 r5:8528278c r4:85282400 r7:dddced80 r6:83018000 r5:8528278c r4:852bc880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522bc00 r8:852bc8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc880 r8:80287e08 r7:eb005e60 r6:852b5f00 r5:8522bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb00dfb0 to 0xeb00dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:830cbac0 INFO: task kworker/0:409:4488 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a7eb1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred r4:8522d400 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8528178c r4:85281400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8522d400 r8:852bc92c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:411:4491 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:411 state:D stack:0 pid:4491 tgid:4491 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb019d84 r8:00000002 r7:60000113 r6:eb019d8c r5:8522c800 r4:8522c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8522c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb019e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dc040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522c800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85281b8c r4:85281800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85281b8c r4:852bc980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522c800 r8:852bc9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bc980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bc980 r8:80287e08 r7:eb00de60 r6:852e0000 r5:8522c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb019fb0 to 0xeb019ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dc000 INFO: task kworker/0:411:4491 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a8122000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:e0431dc0 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:412 state:D stack:0 pid:4494 tgid:4494 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb025d84 r8:00000002 r7:60000113 r6:eb025d8c r5:85228c00 r4:85228c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85228c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb025e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dc180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85228c00 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0537000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85281f8c r4:85281c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85281f8c r4:852bca00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85228c00 r8:852bca2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bca00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bca00 r8:80287e08 r7:eb00de60 r6:852e0080 r5:85228c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb025fb0 to 0xeb025ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dc2c0 INFO: task kworker/0:412:4494 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a8529000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Exception stack(0xe0431fb0 to 0xe0431ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:413 state:D stack:0 pid:4495 tgid:4495 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85230000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb029e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dc340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85230000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e480f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528238c r4:85282000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528238c r4:852bca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85230000 r8:852bcaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bca80 r8:80287e08 r7:eb00de60 r6:852e0100 r5:85230000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb029fb0 to 0xeb029ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dc140 INFO: task kworker/0:413:4495 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a8863000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:414:4498 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:414 state:D stack:0 pid:4498 tgid:4498 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb035d84 r8:00000002 r7:60000113 r6:eb035d8c r5:85232400 r4:85232400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85232400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb035e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:85282b8c r4:85282800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85232400 r8:852bcb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bcb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bcb00 r8:80287e08 r7:eb00de60 r6:852e0180 r5:85232400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb035fb0 to 0xeb035ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dc300 INFO: task kworker/0:414:4498 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a8863000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r5:00001000 r4:e0439000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r4:85233000 r5:85233000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb03de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dc640 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85282f8c r4:85282c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:852bcb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:416:4501 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:416 state:D stack:0 pid:4501 tgid:4501 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb041d84 r8:00000002 r7:60000113 r6:eb041d8c r5:85231800 r4:85231800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85231800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb041e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dca00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85231800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea989000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85283b8c r4:85283800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85283b8c r4:852bcc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85231800 r8:852bcc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bcc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bcc00 r8:80287e08 r7:eb03de60 r6:852e0280 r5:85231800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb041fb0 to 0xeb041ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dc540 INFO: task kworker/0:416:4501 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a8a75000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea935000 r5:8528338c r4:85283000 r7:dddced80 r6:83018000 r5:8528338c r4:852bcc80 Exception stack(0xeb049fb0 to 0xeb049ff8) task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:418:4505 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:418 state:D stack:0 pid:4505 tgid:4505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb051d84 r8:00000002 r7:60000113 r6:eb051d8c r5:85233c00 r4:85233c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85233c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb051e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dc900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85233c00 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea963000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528378c r4:85283400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528378c r4:852bcd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85233c00 r8:852bcd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bcd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bcd00 r8:80287e08 r7:eb041e60 r6:852e0380 r5:85233c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb051fb0 to 0xeb051ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dc780 INFO: task kworker/0:418:4505 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a907f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:419:4508 blocked for more than 463 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:419 state:D stack:0 pid:4508 tgid:4508 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb05dd84 r8:00000002 r7:60000113 r6:eb05dd8c r5:85234800 r4:85234800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85234800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb05de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dcb40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85234800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85283f8c r4:85283c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85283f8c r4:852bcd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85234800 r8:852bcdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bcd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bcd80 r8:80287e08 r7:eb041e60 r6:852e0400 r5:85234800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb05dfb0 to 0xeb05dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dca40 INFO: task kworker/0:419:4508 is blocked on a mutex likely owned by task kworker/0:173:3630. Call trace: 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85235400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb061e08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:85235400 r8:852bce2c r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a92df000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:421:4511 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:421 state:D stack:0 pid:4511 tgid:4511 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb069d84 r8:00000002 r7:60000113 r6:eb069d8c r5:85236000 r4:85236000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85236000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb069e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dccc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85236000 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528438c r4:85284000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528438c r4:852bce80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85236000 r8:852bceac r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bce80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bce80 r8:80287e08 r7:eb061e60 r6:852e0500 r5:85236000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb069fb0 to 0xeb069ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dce00 INFO: task kworker/0:421:4511 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a92df000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:8522e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb071e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:852dce40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8522e000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528478c r4:85284400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528478c r4:852bcf00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522e000 r8:852bcf2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:852bcf00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852bcf00 r8:80287e08 r7:eb061e60 r6:852e0580 r5:8522e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb071fb0 to 0xeb071ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dcc40 INFO: task kworker/0:422:4513 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a92df000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:84b4ef8c r4:84b4ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:423:4516 blocked for more than 464 seconds. Call trace: r4:85238c00 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85238c00 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 r5:85286f8c r4:85286c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85286f8c r4:852bcf80 r10:61c88647 r9:85238c00 r8:852bcfac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dcd80 INFO: task kworker/0:423:4516 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a982b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:424:4517 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:424 state:D stack:0 pid:4517 tgid:4517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb081d84 r8:00000002 r7:60000113 r6:eb081d8c r5:85239800 r4:85239800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85239800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb081e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85239800 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85284f8c r4:85284c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85284f8c r4:830cc300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85239800 r8:830cc32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc300 r8:80287e08 r7:eb07de60 r6:852e0680 r5:85239800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb081fb0 to 0xeb081ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852dcf40 INFO: task kworker/0:424:4517 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a982b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Exception stack(0xe0431fb0 to 0xe0431ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r4:8523b000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb089e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523b000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528538c r4:85285000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528538c r4:830cc280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523b000 r8:830cc2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:830cc280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:830cc280 r8:80287e08 r7:eb07de60 r6:852e0700 r5:8523b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb089fb0 to 0xeb089ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332000 INFO: task kworker/0:425:4519 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a9af9000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:426:4521 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:426 state:D stack:0 pid:4521 tgid:4521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb091d84 r8:00000002 r7:60000113 r6:eb091d8c r5:8523a400 r4:8523a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb091e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332240 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523a400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac0f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528578c r4:85285400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528578c r4:85334000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523a400 r8:8533402c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334000 r8:80287e08 r7:eb07de60 r6:852e0780 r5:8523a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb091fb0 to 0xeb091ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332140 INFO: task kworker/0:426:4521 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a9d7d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:427:4523 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:427 state:D stack:0 pid:4523 tgid:4523 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb099d84 r8:00000002 r7:60000013 r6:eb099d8c r5:85238000 r4:85238000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85238000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb099e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332440 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85238000 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85285b8c r4:85285800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85285b8c r4:85334080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85238000 r8:853340ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334080 r8:80287e08 r7:eb07de60 r6:852e0800 r5:85238000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb099fb0 to 0xeb099ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332140 INFO: task kworker/0:427:4523 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: a9fe8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0a1e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85285f8c r4:85285c00 r7:dddced80 r6:83018000 r5:85285f8c r4:85334100 r10:00000000 r9:85334100 r8:80287e08 r7:eb07de60 r6:852e0880 r5:8523bc00 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0439000 r4:84aeca80 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:429:4527 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:429 state:D stack:0 pid:4527 tgid:4527 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf55d84 r8:00000002 r7:60000113 r6:eaf55d8c r5:84969800 r4:84969800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84969800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf55e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84969800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528638c r4:85286000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528638c r4:85334180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84969800 r8:853341ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334180 r8:80287e08 r7:eb07de60 r6:85334200 r5:84969800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf55fb0 to 0xeaf55ff8) 5fa0: 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:430:4530 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:430 state:D stack:0 pid:4530 tgid:4530 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0a5d84 r8:00000002 r7:60000013 r6:eb0a5d8c r5:8496bc00 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8528678c r4:85286400 r10:61c88647 r9:8496bc00 r8:853342ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:431:4531 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:431 state:D stack:0 pid:4531 tgid:4531 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff1d84 r8:00000002 r7:60000113 r6:eaff1d8c r5:8496c800 r4:8496c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85286b8c r4:85286800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85286b8c r4:85334380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496c800 r8:853343ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334380 r8:80287e08 r7:eb07de60 r6:85334400 r5:8496c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff1fb0 to 0xeaff1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332780 INFO: task kworker/0:431:4531 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: aa7ea000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 r4:84aeca80 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:432:4534 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:432 state:D stack:0 pid:4534 tgid:4534 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b1d84 r8:00000002 r7:60000013 r6:eb0b1d8c r5:8496d400 r4:8496d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8496d400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca3000 r5:8528738c r4:85287000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8496d400 r8:853344ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) r4:82ac21e4 r4:00000000 r5:84b4ef8c r4:84b4ec00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:433:4536 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:433 state:D stack:0 pid:4536 tgid:4536 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0add84 r8:00000002 r7:60000113 r6:eb0add8c r5:8496ec00 r4:8496ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8496ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85287f8c r4:85287c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85287f8c r4:85334580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496ec00 r8:853345ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334580 r8:80287e08 r7:eb0b1e60 r6:85334600 r5:8496ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0adfb0 to 0xeb0adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332c00 INFO: task kworker/0:433:4536 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: aadbb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:434:4538 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:434 state:D stack:0 pid:4538 tgid:4538 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0b9d84 r8:00000002 r7:60000013 r6:eb0b9d8c r5:84968000 r4:84968000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84968000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85332e80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84968000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528778c r4:85287400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528778c r4:85334680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968000 r8:853346ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334680 r8:80287e08 r7:eb0ade60 r6:85334700 r5:84968000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0b9fb0 to 0xeb0b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332dc0 INFO: task kworker/0:434:4538 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:80050013 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r5:84b4ef8c r4:84b4ec00 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:435:4539 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:435 state:D stack:0 pid:4539 tgid:4539 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0bdd84 r8:00000002 r7:60000013 r6:eb0bdd8c r5:84968c00 r4:84968c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84968c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85338a40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84968c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515e38c r4:8515e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8515e38c r4:85334780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84968c00 r8:853347ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334780 r8:80287e08 r7:eb0ade60 r6:85334800 r5:84968c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0bdfb0 to 0xeb0bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:852c48c0 INFO: task kworker/0:435:4539 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ab256000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8496b000 r8:853348ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r5:00001000 r4:e0439000 r5:84b4ef8c r4:84b4ec00 r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:437:4544 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:437 state:D stack:0 pid:4544 tgid:4544 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c1d84 r8:00000002 r7:60000113 r6:eb0c1d8c r5:8496e000 r4:8496e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8496e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853481c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8496e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eace7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528c38c r4:8528c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528c38c r4:85334980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8496e000 r8:853349ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334980 r8:80287e08 r7:eb0ade60 r6:85334a00 r5:8496e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c1fb0 to 0xeb0c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85348000 INFO: task kworker/0:437:4544 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ab89d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:438:4545 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:438 state:D stack:0 pid:4545 tgid:4545 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0c9d84 r8:00000002 r7:60000113 r6:eb0c9d8c r5:83243c00 r4:83243c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:83243c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:83243c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacef000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528c78c r4:8528c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528c78c r4:85334a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:83243c00 r8:85334aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334a80 r8:80287e08 r7:eb0c1e60 r6:85334b00 r5:83243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c9fb0 to 0xeb0c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85348240 INFO: task kworker/0:438:4545 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ab89d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Not tainted 6.15.0-rc7-syzkaller #0 r4:8519ec00 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8519ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528cf8c r4:8528cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528cf8c r4:85334b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8519ec00 r8:85334bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334b80 r8:80287e08 r7:eb0c9e60 r6:85334c00 r5:8519ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0c5fb0 to 0xeb0c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853483c0 INFO: task kworker/0:439:4548 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: aba7b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:440:4549 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:440 state:D stack:0 pid:4549 tgid:4549 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0cdd84 r8:00000002 r7:60000013 r6:eb0cdd8c r5:85270000 r4:85270000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85270000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85270000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead01000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528cb8c r4:8528c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528cb8c r4:85334c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85270000 r8:85334cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334c80 r8:80287e08 r7:eb0c5e60 r6:85334d00 r5:85270000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0cdfb0 to 0xeb0cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853483c0 INFO: task kworker/0:440:4549 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: abd02000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:441:4552 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:441 state:D stack:0 pid:4552 tgid:4552 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d1d84 r8:00000002 r7:60000113 r6:eb0d1d8c r5:85270c00 r4:85270c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85270c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348a00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85270c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528d78c r4:8528d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528d78c r4:85334d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85270c00 r8:85334dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334d80 r8:80287e08 r7:eb0c5e60 r6:85334e00 r5:85270c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d1fb0 to 0xeb0d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853486c0 INFO: task kworker/0:441:4552 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: abf0d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r5:84b4ef8c r4:84b4ec00 r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b0e0c0 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d9d84 r8:00000002 r7:60000113 r6:eb0d9d8c r5:85271800 r4:85271800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85271800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853487c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85271800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528d38c r4:8528d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528d38c r4:85334e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85271800 r8:85334eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334e80 r8:80287e08 r7:eb0d1e60 r6:85334f00 r5:85271800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d9fb0 to 0xeb0d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853486c0 INFO: task kworker/0:442:4554 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ac708000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:443:4556 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:443 state:D stack:0 pid:4556 tgid:4556 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0e5d84 r8:00000002 r7:60000113 r6:eb0e5d8c r5:85272400 r4:85272400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85272400 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348f80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85272400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead63000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528df8c r4:8528dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528df8c r4:85334f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85272400 r8:85334fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85334f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85334f80 r8:80287e08 r7:eb0d1e60 r6:85354000 r5:85272400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e5fb0 to 0xeb0e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853489c0 INFO: task kworker/0:443:4556 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: acf35000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:444:4557 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:444 state:D stack:0 pid:4557 tgid:4557 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0edd84 r8:00000002 r7:60000113 r6:eb0edd8c r5:85273c00 r4:85273c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85273c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85353000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85273c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528e78c r4:8528e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528e78c r4:85354080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85273c00 r8:853540ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354080 r8:80287e08 r7:eb0e5e60 r6:85354100 r5:85273c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0edfb0 to 0xeb0edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853489c0 INFO: task kworker/0:444:4557 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: acffe000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:274:4560 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:274 state:D stack:0 pid:4560 tgid:4560 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85273000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f5e08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85449d40 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8532c78c r4:8532c400 r7:ddde2d80 r6:83018200 r5:8532c78c r4:852e0900 r10:61c88647 r9:85273000 r8:852e092c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0900 r8:80287e08 r7:eaecde60 r6:852e0980 r5:85273000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0f5fb0 to 0xeb0f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853382c0 INFO: task kworker/1:274:4560 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: acffe000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:275:4562 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:275 state:D stack:0 pid:4562 tgid:4562 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0e9d84 r8:00000002 r7:60000113 r6:eb0e9d8c r5:8523c800 r4:8523c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85359000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8523c800 r7:00000000 r6:83018200 r5:00001000 r4:7f0cd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515ef8c r4:8515ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515ef8c r4:852e0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523c800 r8:852e0a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:852e0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:852e0a00 r8:80287e08 r7:eb0f5e60 r6:852e0a80 r5:8523c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0e9fb0 to 0xeb0e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853386c0 INFO: task kworker/1:275:4562 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ad30f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:445:4564 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:445 state:D stack:0 pid:4564 tgid:4564 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0fdd84 r8:00000002 r7:60000113 r6:eb0fdd8c r5:8523e000 r4:8523e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0fde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523e000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528e38c r4:8528e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528e38c r4:85354200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523e000 r8:8535422c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354200 r8:80287e08 r7:eb0ede60 r6:852e0b00 r5:8523e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0fdfb0 to 0xeb0fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:445:4564 is blocked on a mutex likely owned by task kworker/0:173:3630. r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:82ac21e4 r4:e0431dc0 r4:00000000 r5:00001000 r4:e0439000 r5:84b4ef8c r4:84b4ec00 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:446:4566 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:446 state:D stack:0 pid:4566 tgid:4566 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb105d84 r8:00000002 r7:60000013 r6:eb105d8c r5:8523ec00 r4:8523ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8523ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb105e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85353280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8523ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0cf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528eb8c r4:8528e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528eb8c r4:85354180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8523ec00 r8:853541ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354180 r8:80287e08 r7:eb0ede60 r6:852e0b80 r5:8523ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb105fb0 to 0xeb105ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353080 INFO: task kworker/0:446:4566 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ad639000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:447:4569 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0f9e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xeb0f9fb0 to 0xeb0f9ff8) task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Not tainted 6.15.0-rc7-syzkaller #0 r4:8522ec00 r4:00000000 r9:83018005 r8:8522ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0d3000 r5:8528f38c r4:8528f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528f38c r4:85354300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8522ec00 r8:8535432c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354300 r8:80287e08 r7:eb0f9e60 r6:852e0c80 r5:8522ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb10dfb0 to 0xeb10dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353380 INFO: task kworker/0:448:4572 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ada97000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:449:4574 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:449 state:D stack:0 pid:4574 tgid:4574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb115d84 r8:00000002 r7:60000113 r6:eb115d8c r5:85268c00 r4:85268c00 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:00001000 r4:dfa6d000 r5:8529438c r4:85294000 r7:dddced80 r6:83018000 r5:8529438c r4:85354380 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 1d20: ada97000 e0123000 00000001 80239b98 7f4df000 00000001 r4:00000000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:450:4575 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:450 state:D stack:0 pid:4575 tgid:4575 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb119d84 r8:00000002 r7:60000113 r6:eb119d8c r5:85269800 r4:85269800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85269800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb119e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85353540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85269800 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528f78c r4:8528f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528f78c r4:85354400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85269800 r8:8535442c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354400 r8:80287e08 r7:eb115e60 r6:852e0d80 r5:85269800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb119fb0 to 0xeb119ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353700 INFO: task kworker/0:450:4575 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: add5a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r5:85268000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb121e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85353780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85268000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaddf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8528fb8c r4:8528f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528fb8c r4:85354480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85268000 r8:853544ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354480 r8:80287e08 r7:eb115e60 r6:852e0e00 r5:85268000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb121fb0 to 0xeb121ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353580 INFO: task kworker/0:451:4577 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ae16e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:452:4579 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:452 state:D stack:0 pid:4579 tgid:4579 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf11d84 r8:00000002 r7:60000013 r6:eaf11d8c r5:8526a400 r4:8526a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8528ff8c r4:8528fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8528ff8c r4:85354500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526a400 r8:8535452c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354500 r8:80287e08 r7:eb115e60 r6:852e0e80 r5:8526a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf11fb0 to 0xeaf11ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353740 INFO: task kworker/0:452:4579 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ae2eb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:453:4582 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:453 state:D stack:0 pid:4582 tgid:4582 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaf9dd84 r8:00000002 r7:60000113 r6:eaf9dd8c r5:8526b000 r4:8526b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaf9de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85353e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526b000 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e059b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529538c r4:85295000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529538c r4:85354580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526b000 r8:853545ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354580 r8:80287e08 r7:eb115e60 r6:852e0f00 r5:8526b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaf9dfb0 to 0xeaf9dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353880 INFO: task kworker/0:453:4582 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ae2eb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:454:4584 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:454 state:D stack:0 pid:4584 tgid:4584 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:8526bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb129e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85353a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0007000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529478c r4:85294400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529478c r4:85354600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526bc00 r8:8535462c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354600 r8:80287e08 r7:eaf9de60 r6:852e0f80 r5:8526bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb129fb0 to 0xeb129ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353940 INFO: task kworker/0:454:4584 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ae860000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:455:4585 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:455 state:D stack:0 pid:4585 tgid:4585 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb12dd84 r8:00000002 r7:60000113 r6:eb12dd8c r5:8526e000 r4:8526e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb12de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85353bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526e000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85294b8c r4:85294800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85294b8c r4:85354680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526e000 r8:853546ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354680 r8:80287e08 r7:eaf9de60 r6:85366000 r5:8526e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb12dfb0 to 0xeb12dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353ac0 INFO: task kworker/0:455:4585 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ae860000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:456:4587 blocked for more than 464 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:456 state:D stack:0 pid:4587 tgid:4587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb135d84 r8:00000002 r7:60000113 r6:eb135d8c r5:8526c800 r4:8526c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb135e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85353d00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526c800 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0435000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85294f8c r4:85294c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85294f8c r4:85354700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526c800 r8:8535472c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354700 r8:80287e08 r7:eaf9de60 r6:85366080 r5:8526c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb135fb0 to 0xeb135ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353c00 INFO: task kworker/0:456:4587 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:457:4590 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:457 state:D stack:0 pid:4590 tgid:4590 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb141d84 r8:00000002 r7:60000113 r6:eb141d8c r5:8526ec00 r4:8526ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8526ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb141e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8526ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0737000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85295b8c r4:85295800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85295b8c r4:85354780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526ec00 r8:853547ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354780 r8:80287e08 r7:eaf9de60 r6:85366100 r5:8526ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb141fb0 to 0xeb141ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353d40 INFO: task kworker/0:457:4590 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: aeed6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:458:4592 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:458 state:D stack:0 pid:4592 tgid:4592 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb145d84 r8:00000002 r7:60000113 r6:eb145d8c r5:8526d400 r4:8526d400 r5:8526d400 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:8526d400 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529578c r4:85295400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529578c r4:85354800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8526d400 r8:8535482c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354800 r8:80287e08 r7:eb141e60 r6:85366300 r5:8526d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb145fb0 to 0xeb145ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364100 INFO: task kworker/0:458:4592 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: aeed6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:459:4594 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:459 state:D stack:0 pid:4594 tgid:4594 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb149d84 r8:00000002 r7:60000013 r6:eb149d8c r5:85240000 r4:85240000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85240000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb149e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85240000 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4875000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529638c r4:85296000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529638c r4:85354880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85240000 r8:853548ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354880 r8:80287e08 r7:eb141e60 r6:85366380 r5:85240000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb149fb0 to 0xeb149ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853641c0 INFO: task kworker/0:459:4594 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: af3e1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:460:4595 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:460 state:D stack:0 pid:4595 tgid:4595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb101d84 r8:00000002 r7:60000113 r6:eb101d8c r5:85276000 r4:85276000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85276000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb101e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853642c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85276000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85295f8c r4:85295c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85295f8c r4:85354900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85276000 r8:8535492c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354900 r8:80287e08 r7:eb149e60 r6:85354980 r5:85276000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb101fb0 to 0xeb101ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364480 INFO: task kworker/0:460:4595 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: af3e1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:461:4598 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:461 state:D stack:0 pid:4598 tgid:4598 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb13dd84 r8:00000002 r7:60000113 r6:eb13dd8c r5:85276c00 r4:85276c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85276c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb13de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85276c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea9f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529678c r4:85296400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529678c r4:85354a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85276c00 r8:85354a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354a00 r8:80287e08 r7:eb149e60 r6:85354a80 r5:85276c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb13dfb0 to 0xeb13dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364480 INFO: task kworker/0:461:4598 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: af6a5000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:462:4599 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:462 state:D stack:0 pid:4599 tgid:4599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb151d84 r8:00000002 r7:60000013 r6:eb151d8c r5:85274800 r4:85274800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85274800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb151e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853647c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85274800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa99000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85296b8c r4:85296800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85296b8c r4:85354b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85274800 r8:85354b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354b00 r8:80287e08 r7:eb13de60 r6:85354b80 r5:85274800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb151fb0 to 0xeb151ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364480 INFO: task kworker/0:462:4599 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: af6a5000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:463:4602 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:463 state:D stack:0 pid:4602 tgid:4602 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb155d84 r8:00000002 r7:60000013 r6:eb155d8c r5:85275400 r4:85275400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85275400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb155e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85275400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529738c r4:85297000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529738c r4:85354c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85275400 r8:85354c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354c00 r8:80287e08 r7:eb151e60 r6:85354c80 r5:85275400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb155fb0 to 0xeb155ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364780 INFO: task kworker/0:463:4602 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: af6a5000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:464:4603 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:464 state:D stack:0 pid:4603 tgid:4603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb0d5d84 r8:00000002 r7:60000113 r6:eb0d5d8c r5:85236c00 r4:85236c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85236c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb0d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853648c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85236c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85296f8c r4:85296c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85296f8c r4:85354d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85236c00 r8:85354d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354d00 r8:80287e08 r7:eb155e60 r6:85354d80 r5:85236c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb0d5fb0 to 0xeb0d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364780 INFO: task kworker/0:464:4603 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: afc01000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:465:4607 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:465 state:D stack:0 pid:4607 tgid:4607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb159d84 r8:00000002 r7:60000113 r6:eb159d8c r5:848a8000 r4:848a8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb159e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364b40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaafb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529778c r4:85297400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529778c r4:85354e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a8000 r8:85354e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354e00 r8:80287e08 r7:eb155e60 r6:85354e80 r5:848a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb159fb0 to 0xeb159ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364e00 INFO: task kworker/0:465:4607 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: affd4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:466:4609 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:466 state:D stack:0 pid:4609 tgid:4609 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb161d84 r8:00000002 r7:60000013 r6:eb161d8c r5:848a8c00 r4:848a8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb161e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364cc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab19000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85297b8c r4:85297800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85297b8c r4:85354f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a8c00 r8:85354f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85354f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85354f00 r8:80287e08 r7:eb159e60 r6:85354f80 r5:848a8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb161fb0 to 0xeb161ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364f80 INFO: task kworker/0:466:4609 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: affd4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:467:4611 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:467 state:D stack:0 pid:4611 tgid:4611 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb165d84 r8:00000002 r7:60000013 r6:eb165d8c r5:848a9800 r4:848a9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848a9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb165e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537d040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848a9800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529c78c r4:8529c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529c78c r4:85378000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848a9800 r8:8537802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378000 r8:80287e08 r7:eb161e60 r6:85378080 r5:848a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb165fb0 to 0xeb165ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85364a40 INFO: task kworker/0:467:4611 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b0180000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:468:4612 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:468 state:D stack:0 pid:4612 tgid:4612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb16dd84 r8:00000002 r7:60000013 r6:eb16dd8c r5:848aa400 r4:848aa400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848aa400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb16de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85364e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85297f8c r4:85297c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85297f8c r4:85378100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848aa400 r8:8537812c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378100 r8:80287e08 r7:eb165e60 r6:85378180 r5:848aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb16dfb0 to 0xeb16dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353f80 INFO: task kworker/0:468:4612 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b03f8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:469:4613 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:469 state:D stack:0 pid:4613 tgid:4613 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb15dd84 r8:00000002 r7:60000113 r6:eb15dd8c r5:848ab000 r4:848ab000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ab000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb15de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85348e80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ab000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529c38c r4:8529c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529c38c r4:85378200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ab000 r8:8537822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378200 r8:80287e08 r7:eb165e60 r6:85378280 r5:848ab000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb15dfb0 to 0xeb15dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85353f80 INFO: task kworker/0:469:4613 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b03f8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:470:4617 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:470 state:D stack:0 pid:4617 tgid:4617 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb171d84 r8:00000002 r7:60000013 r6:eb171d8c r5:848abc00 r4:848abc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848abc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb171e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537d340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529cf8c r4:8529cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529cf8c r4:85378300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848abc00 r8:8537832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378300 r8:80287e08 r7:eb165e60 r6:85378380 r5:848abc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb171fb0 to 0xeb171ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537d000 INFO: task kworker/0:470:4617 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b055d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:471:4618 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:471 state:D stack:0 pid:4618 tgid:4618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb175d84 r8:00000002 r7:60000013 r6:eb175d8c r5:848ac800 r4:848ac800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ac800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb175e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537d100 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ac800 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529cb8c r4:8529c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529cb8c r4:85378400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ac800 r8:8537842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378400 r8:80287e08 r7:eb171e60 r6:85378480 r5:848ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb175fb0 to 0xeb175ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537d140 INFO: task kworker/0:471:4618 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b0997000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:472:4620 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:472 state:D stack:0 pid:4620 tgid:4620 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb17dd84 r8:00000002 r7:60000013 r6:eb17dd8c r5:848ae000 r4:848ae000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ae000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb17de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537d600 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529d38c r4:8529d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529d38c r4:85378500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ae000 r8:8537852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378500 r8:80287e08 r7:eb171e60 r6:85378580 r5:848ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb17dfb0 to 0xeb17dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537d300 INFO: task kworker/0:472:4620 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b0bf6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:473:4622 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:473 state:D stack:0 pid:4622 tgid:4622 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb181d84 r8:00000002 r7:60000013 r6:eb181d8c r5:853b8000 r4:853b8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb181e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537da80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853b8000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadfb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529db8c r4:8529d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529db8c r4:85378600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b8000 r8:8537862c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378600 r8:80287e08 r7:eb17de60 r6:85378680 r5:853b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb181fb0 to 0xeb181ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537d300 INFO: task kworker/0:473:4622 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b1053000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:474:4625 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:474 state:D stack:0 pid:4625 tgid:4625 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb189d84 r8:00000002 r7:60000013 r6:eb189d8c r5:853ba400 r4:853ba400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ba400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb189e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537d8c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ba400 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529d78c r4:8529d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529d78c r4:85378700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ba400 r8:8537872c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378700 r8:80287e08 r7:eb181e60 r6:85378780 r5:853ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb189fb0 to 0xeb189ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537d880 INFO: task kworker/0:474:4625 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b1531000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:475:4627 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:475 state:D stack:0 pid:4627 tgid:4627 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb18dd84 r8:00000002 r7:60000013 r6:eb18dd8c r5:853bb000 r4:853bb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb18de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853bb000 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529e38c r4:8529e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529e38c r4:85378800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bb000 r8:8537882c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378800 r8:80287e08 r7:eb181e60 r6:85378880 r5:853bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb18dfb0 to 0xeb18dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537da40 INFO: task kworker/0:475:4627 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b1742000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:276:4628 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:276 state:D stack:0 pid:4628 tgid:4628 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb191d84 r8:00000002 r7:60000113 r6:eb191d8c r5:853b9800 r4:853b9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb191e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515f78c r4:8515f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515f78c r4:85366400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b9800 r8:8536642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85366400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366400 r8:80287e08 r7:eb0f5e60 r6:85378900 r5:853b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb191fb0 to 0xeb191ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85332ec0 INFO: task kworker/1:276:4628 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b220e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:476:4629 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:476 state:D stack:0 pid:4629 tgid:4629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb195d84 r8:00000002 r7:60000013 r6:eb195d8c r5:853b8c00 r4:853b8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853b8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb195e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537dd40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853b8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529df8c r4:8529dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529df8c r4:85378980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853b8c00 r8:853789ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378980 r8:80287e08 r7:eb18de60 r6:85378a00 r5:853b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb195fb0 to 0xeb195ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537dd00 INFO: task kworker/0:476:4629 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b220e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:477:4632 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:477 state:D stack:0 pid:4632 tgid:4632 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb199d84 r8:00000002 r7:60000013 r6:eb199d8c r5:853bbc00 r4:853bbc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bbc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb199e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537bd00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853bbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529f78c r4:8529f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529f78c r4:85378a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bbc00 r8:85378aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378a80 r8:80287e08 r7:eb18de60 r6:85378b00 r5:853bbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb199fb0 to 0xeb199ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537b100 INFO: task kworker/0:477:4632 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b22f4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:277:4634 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:277 state:D stack:0 pid:4634 tgid:4634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a1d84 r8:00000002 r7:60000113 r6:eb1a1d8c r5:853bc800 r4:853bc800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bc800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853bc800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515fb8c r4:8515f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515fb8c r4:85366480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bc800 r8:853664ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85366480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366480 r8:80287e08 r7:eb0f5e60 r6:85378b80 r5:853bc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a1fb0 to 0xeb1a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853860c0 INFO: task kworker/1:277:4634 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b22f4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:278:4636 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:278 state:D stack:0 pid:4636 tgid:4636 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb179d84 r8:00000002 r7:60000113 r6:eb179d8c r5:85240c00 r4:85240c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85240c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb179e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85240c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae49000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8515ff8c r4:8515fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8515ff8c r4:85366500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85240c00 r8:8536652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85366500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366500 r8:80287e08 r7:eb0f5e60 r6:85366580 r5:85240c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb179fb0 to 0xeb179ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386140 INFO: task kworker/1:278:4636 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b2898000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:478:4637 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:478 state:D stack:0 pid:4637 tgid:4637 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a5d84 r8:00000002 r7:60000013 r6:eb1a5d8c r5:85241800 r4:85241800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85241800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85241800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae85000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529e78c r4:8529e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529e78c r4:85378c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85241800 r8:85378c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378c00 r8:80287e08 r7:eb199e60 r6:85366600 r5:85241800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a5fb0 to 0xeb1a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537b540 INFO: task kworker/0:478:4637 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b2898000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:279:4639 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:279 state:D stack:0 pid:4639 tgid:4639 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1a9d84 r8:00000002 r7:60000113 r6:eb1a9d8c r5:85243000 r4:85243000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85243000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853863c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85243000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae5f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447038c r4:84470000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447038c r4:85366680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85243000 r8:853666ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85366680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366680 r8:80287e08 r7:eb0f5e60 r6:85366700 r5:85243000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1a9fb0 to 0xeb1a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386400 INFO: task kworker/1:279:4639 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b2aae000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:280:4641 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:280 state:D stack:0 pid:4641 tgid:4641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1add84 r8:00000002 r7:60000113 r6:eb1add8c r5:85243c00 r4:85243c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85243c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853865c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85243c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8446178c r4:84461400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8446178c r4:85366780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85243c00 r8:853667ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85366780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366780 r8:80287e08 r7:eb0f5e60 r6:85366800 r5:85243c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1adfb0 to 0xeb1adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386700 INFO: task kworker/1:280:4641 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b2bd1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:281:4643 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:281 state:D stack:0 pid:4643 tgid:4643 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb185d84 r8:00000002 r7:60000113 r6:eb185d8c r5:85244800 r4:85244800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85244800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb185e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538b7c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85244800 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea96d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447078c r4:84470400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447078c r4:85366880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85244800 r8:853668ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85366880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366880 r8:80287e08 r7:eb0f5e60 r6:85366900 r5:85244800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb185fb0 to 0xeb185ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85386700 INFO: task kworker/1:281:4643 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b2e1a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:479:4646 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:479 state:D stack:0 pid:4646 tgid:4646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b5d84 r8:00000002 r7:60000013 r6:eb1b5d8c r5:85245400 r4:85245400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85245400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85245400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae91000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529eb8c r4:8529e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529eb8c r4:85378c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85245400 r8:85378cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378c80 r8:80287e08 r7:eb199e60 r6:85366980 r5:85245400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b5fb0 to 0xeb1b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537b6c0 INFO: task kworker/0:479:4646 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b2e50000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:480:4647 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:480 state:D stack:0 pid:4647 tgid:4647 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b9d84 r8:00000002 r7:60000113 r6:eb1b9d8c r5:85246000 r4:85246000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85246000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85246000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaebb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529ef8c r4:8529ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529ef8c r4:85378d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85246000 r8:85378d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378d00 r8:80287e08 r7:eb199e60 r6:85366a00 r5:85246000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b9fb0 to 0xeb1b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537b6c0 INFO: task kworker/0:480:4647 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b32ac000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:481:4649 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:481 state:D stack:0 pid:4649 tgid:4649 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1bdd84 r8:00000002 r7:60000113 r6:eb1bdd8c r5:85246c00 r4:85246c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85246c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537bbc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85246c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaef3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529f38c r4:8529f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529f38c r4:85378d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85246c00 r8:85378dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378d80 r8:80287e08 r7:eb199e60 r6:85366a80 r5:85246c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1bdfb0 to 0xeb1bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537b9c0 INFO: task kworker/0:481:4649 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b32ac000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:482:4652 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:482 state:D stack:0 pid:4652 tgid:4652 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1c9d84 r8:00000002 r7:60000113 r6:eb1c9d8c r5:853e8c00 r4:853e8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537bc80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529fb8c r4:8529f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529fb8c r4:85378e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8c00 r8:85378e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378e00 r8:80287e08 r7:eb199e60 r6:85366b00 r5:853e8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c9fb0 to 0xeb1c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537b8c0 INFO: task kworker/0:482:4652 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b34be000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:483:4655 blocked for more than 465 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:483 state:D stack:0 pid:4655 tgid:4655 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1d5d84 r8:00000002 r7:60000113 r6:eb1d5d8c r5:853e8000 r4:853e8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853842c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e8000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e053b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a978c r4:852a9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a978c r4:85378e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e8000 r8:85378eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378e80 r8:80287e08 r7:eb1c9e60 r6:85366b80 r5:853e8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1d5fb0 to 0xeb1d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537bd40 INFO: task kworker/0:483:4655 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b3677000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:484:4656 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:484 state:D stack:0 pid:4656 tgid:4656 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eabd1d84 r8:00000002 r7:60000113 r6:eabd1d8c r5:853eb000 r4:853eb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eabd1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537be80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853eb000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8529ff8c r4:8529fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8529ff8c r4:85378f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853eb000 r8:85378f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378f00 r8:80287e08 r7:eb1d5e60 r6:85366c00 r5:853eb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeabd1fb0 to 0xeabd1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537bd40 INFO: task kworker/0:484:4656 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b3761000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:485:4657 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:485 state:D stack:0 pid:4657 tgid:4657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaff5d84 r8:00000002 r7:60000113 r6:eaff5d8c r5:853e9800 r4:853e9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaff5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537bf40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e9800 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df87f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a838c r4:852a8000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a838c r4:85378f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e9800 r8:85378fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85378f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85378f80 r8:80287e08 r7:eb1d5e60 r6:85366c80 r5:853e9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaff5fb0 to 0xeaff5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537b1c0 INFO: task kworker/0:485:4657 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b3e6d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:486:4659 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:486 state:D stack:0 pid:4659 tgid:4659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eaffdd84 r8:00000002 r7:60000113 r6:eaffdd8c r5:853ec800 r4:853ec800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ec800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eaffde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537df00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ec800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfaf1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a878c r4:852a8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a878c r4:85377000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ec800 r8:8537702c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377000 r8:80287e08 r7:eb1d5e60 r6:85366d00 r5:853ec800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeaffdfb0 to 0xeaffdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537bf80 INFO: task kworker/0:486:4659 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b3e6d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:487:4661 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:487 state:D stack:0 pid:4661 tgid:4661 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb02dd84 r8:00000002 r7:60000113 r6:eb02dd8c r5:853ebc00 r4:853ebc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ebc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb02de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537b500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ebc00 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfcdf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a8b8c r4:852a8800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a8b8c r4:85377080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ebc00 r8:853770ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377080 r8:80287e08 r7:eb1d5e60 r6:85366d80 r5:853ebc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb02dfb0 to 0xeb02dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537de80 INFO: task kworker/0:487:4661 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b41cc000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:488:4663 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:488 state:D stack:0 pid:4663 tgid:4663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb04dd84 r8:00000002 r7:60000113 r6:eb04dd8c r5:853ea400 r4:853ea400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ea400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb04de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ea400 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a8f8c r4:852a8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a8f8c r4:85377100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ea400 r8:8537712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377100 r8:80287e08 r7:eb1d5e60 r6:85366e00 r5:853ea400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb04dfb0 to 0xeb04dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8537b0c0 INFO: task kworker/0:488:4663 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b41cc000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:489:4665 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:489 state:D stack:0 pid:4665 tgid:4665 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb06dd84 r8:00000002 r7:60000113 r6:eb06dd8c r5:853eec00 r4:853eec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853eec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb06de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853eec00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dffdb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a938c r4:852a9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a938c r4:85377180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853eec00 r8:853771ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377180 r8:80287e08 r7:eb1d5e60 r6:85366e80 r5:853eec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb06dfb0 to 0xeb06dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384280 INFO: task kworker/0:489:4665 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b44ec000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:490:4668 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:490 state:D stack:0 pid:4668 tgid:4668 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1ddd84 r8:00000002 r7:60000013 r6:eb1ddd8c r5:853ee000 r4:853ee000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ee000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:853844c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ee000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88f9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a9f8c r4:852a9c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a9f8c r4:85377200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ee000 r8:8537722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377200 r8:80287e08 r7:eb1d5e60 r6:85366f00 r5:853ee000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1ddfb0 to 0xeb1ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384100 INFO: task kworker/0:490:4668 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b4684000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:491:4669 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:491 state:D stack:0 pid:4669 tgid:4669 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e1d84 r8:00000002 r7:60000113 r6:eb1e1d8c r5:85242400 r4:85242400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85242400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85242400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e888f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852a9b8c r4:852a9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852a9b8c r4:85377280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85242400 r8:853772ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377280 r8:80287e08 r7:eb1dde60 r6:85366f80 r5:85242400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e1fb0 to 0xeb1e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384200 INFO: task kworker/0:491:4669 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b4ae6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:492:4671 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:492 state:D stack:0 pid:4671 tgid:4671 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1e9d84 r8:00000002 r7:60000013 r6:eb1e9d8c r5:853f0c00 r4:853f0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384c00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852aaf8c r4:852aac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852aaf8c r4:85377300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0c00 r8:8537732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377300 r8:80287e08 r7:eb1dde60 r6:85366180 r5:853f0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1e9fb0 to 0xeb1e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:853843c0 INFO: task kworker/0:492:4671 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b4ae6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:493:4673 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:493 state:D stack:0 pid:4673 tgid:4673 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1b1d84 r8:00000002 r7:60000113 r6:eb1b1d8c r5:853bd400 r4:853bd400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853bd400 r7:00000000 r6:83018000 r5:00001000 r4:7f061000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852aa38c r4:852aa000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852aa38c r4:85377380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bd400 r8:853773ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377380 r8:80287e08 r7:eb1e9e60 r6:85377400 r5:853bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1b1fb0 to 0xeb1b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384500 INFO: task kworker/0:493:4673 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b4daa000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:494:4678 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:494 state:D stack:0 pid:4678 tgid:4678 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f1d84 r8:00000002 r7:60000113 r6:eb1f1d8c r5:853bec00 r4:853bec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853bec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853bec00 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa6f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852aa78c r4:852aa400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852aa78c r4:85377480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853bec00 r8:853774ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377480 r8:80287e08 r7:eb1e9e60 r6:85377500 r5:853bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f1fb0 to 0xeb1f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384880 INFO: task kworker/0:494:4678 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b512f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:495:4679 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:495 state:D stack:0 pid:4679 tgid:4679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1edd84 r8:00000002 r7:60000013 r6:eb1edd8c r5:853be000 r4:853be000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853be000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384b00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853be000 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852aab8c r4:852aa800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852aab8c r4:85377580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853be000 r8:853775ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377580 r8:80287e08 r7:eb1e9e60 r6:85377600 r5:853be000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1edfb0 to 0xeb1edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384880 INFO: task kworker/0:495:4679 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b5486000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:496:4682 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:496 state:D stack:0 pid:4682 tgid:4682 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1c1d84 r8:00000002 r7:60000013 r6:eb1c1d8c r5:848aec00 r4:848aec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848aec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1c1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384d00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac09000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ab38c r4:852ab000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ab38c r4:85377680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848aec00 r8:853776ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377680 r8:80287e08 r7:eb1e9e60 r6:85377700 r5:848aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1c1fb0 to 0xeb1c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384b80 INFO: task kworker/0:496:4682 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b5486000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:497:4684 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:497 state:D stack:0 pid:4684 tgid:4684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f9d84 r8:00000002 r7:60000013 r6:eb1f9d8c r5:848ad400 r4:848ad400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848ad400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85384e80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac27000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ab78c r4:852ab400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ab78c r4:85377780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848ad400 r8:853777ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377780 r8:80287e08 r7:eb1c1e60 r6:85377800 r5:848ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1f9fb0 to 0xeb1f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384c80 INFO: task kworker/0:497:4684 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b5a7b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:498:4686 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:498 state:D stack:0 pid:4686 tgid:4686 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1fdd84 r8:00000002 r7:60000013 r6:eb1fdd8c r5:84878000 r4:84878000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84878000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1fde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85386a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84878000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852abb8c r4:852ab800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852abb8c r4:85377880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84878000 r8:853778ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377880 r8:80287e08 r7:eb1f9e60 r6:85377900 r5:84878000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1fdfb0 to 0xeb1fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384c80 INFO: task kworker/0:498:4686 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b5aef000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:282:4687 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:282 state:D stack:0 pid:4687 tgid:4687 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb205d84 r8:00000002 r7:60000113 r6:eb205d8c r5:853f3000 r4:853f3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb205e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85449c40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853f3000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532c38c r4:8532c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532c38c r4:85366200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3000 r8:8536622c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85366200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85366200 r8:80287e08 r7:eb0f5e60 r6:85366280 r5:853f3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb205fb0 to 0xeb205ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8538bc40 INFO: task kworker/1:282:4687 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b5d8b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:499:4689 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:499 state:D stack:0 pid:4689 tgid:4689 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb20dd84 r8:00000002 r7:60000113 r6:eb20dd8c r5:853f2400 r4:853f2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb20de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8537dfc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f2400 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852abf8c r4:852abc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852abf8c r4:85377980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f2400 r8:853779ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377980 r8:80287e08 r7:eb1fde60 r6:853a0000 r5:853f2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb20dfb0 to 0xeb20dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85384700 INFO: task kworker/0:499:4689 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b6038000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:500:4691 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:500 state:D stack:0 pid:4691 tgid:4691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb215d84 r8:00000002 r7:60000113 r6:eb215d8c r5:853f4800 r4:853f4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb215e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ee00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f4800 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852aef8c r4:852aec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852aef8c r4:85377a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f4800 r8:85377a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377a00 r8:80287e08 r7:eb20de60 r6:853a0080 r5:853f4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb215fb0 to 0xeb215ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e100 INFO: task kworker/0:500:4691 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b6107000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:501:4692 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:501 state:D stack:0 pid:4692 tgid:4692 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb219d84 r8:00000002 r7:60000113 r6:eb219d8c r5:853f0000 r4:853f0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb219e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f0000 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ac38c r4:852ac000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ac38c r4:85377a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f0000 r8:85377aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377a80 r8:80287e08 r7:eb215e60 r6:853a0100 r5:853f0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb219fb0 to 0xeb219ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e100 INFO: task kworker/0:501:4692 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b6405000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:502:4694 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:502 state:D stack:0 pid:4694 tgid:4694 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb221d84 r8:00000002 r7:60000113 r6:eb221d8c r5:853f6000 r4:853f6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb221e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f6000 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ac78c r4:852ac400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ac78c r4:85377b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6000 r8:85377b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377b00 r8:80287e08 r7:eb215e60 r6:853a0180 r5:853f6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb221fb0 to 0xeb221ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e100 INFO: task kworker/0:502:4694 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b6710000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:503:4696 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:503 state:D stack:0 pid:4696 tgid:4696 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb229d84 r8:00000002 r7:60000113 r6:eb229d8c r5:853f5400 r4:853f5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb229e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f5400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacbb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852acb8c r4:852ac800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852acb8c r4:85377b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f5400 r8:85377bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377b80 r8:80287e08 r7:eb215e60 r6:853a0200 r5:853f5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb229fb0 to 0xeb229ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e440 INFO: task kworker/0:503:4696 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b6844000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:504:4698 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:504 state:D stack:0 pid:4698 tgid:4698 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb235d84 r8:00000002 r7:60000013 r6:eb235d8c r5:853f3c00 r4:853f3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb235e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaccd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852acf8c r4:852acc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852acf8c r4:85377c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f3c00 r8:85377c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377c00 r8:80287e08 r7:eb215e60 r6:853a0280 r5:853f3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb235fb0 to 0xeb235ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e280 INFO: task kworker/0:504:4698 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b6b03000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:505:4700 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:505 state:D stack:0 pid:4700 tgid:4700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb23dd84 r8:00000002 r7:60000113 r6:eb23dd8c r5:853f6c00 r4:853f6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb23de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacdd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ad38c r4:852ad000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ad38c r4:85377c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f6c00 r8:85377cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377c80 r8:80287e08 r7:eb215e60 r6:853a0300 r5:853f6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb23dfb0 to 0xeb23dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e3c0 INFO: task kworker/0:505:4700 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b6edb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:506:4702 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:506 state:D stack:0 pid:4702 tgid:4702 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb245d84 r8:00000002 r7:60000113 r6:eb245d8c r5:853f1800 r4:853f1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb245e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f1800 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ad78c r4:852ad400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ad78c r4:85377d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f1800 r8:85377d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377d00 r8:80287e08 r7:eb215e60 r6:853a0380 r5:853f1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb245fb0 to 0xeb245ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e580 INFO: task kworker/0:506:4702 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b7131000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:507:4704 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:507 state:D stack:0 pid:4704 tgid:4704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb251d84 r8:00000002 r7:60000113 r6:eb251d8c r5:853f8c00 r4:853f8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb251e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852adb8c r4:852ad800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852adb8c r4:85377d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f8c00 r8:85377dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377d80 r8:80287e08 r7:eb215e60 r6:853a0400 r5:853f8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb251fb0 to 0xeb251ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e940 INFO: task kworker/0:507:4704 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b7363000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:508:4706 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:508 state:D stack:0 pid:4706 tgid:4706 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb259d84 r8:00000002 r7:60000013 r6:eb259d8c r5:853f8000 r4:853f8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb259e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539e980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852adf8c r4:852adc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852adf8c r4:85377e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f8000 r8:85377e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377e00 r8:80287e08 r7:eb215e60 r6:853a0480 r5:853f8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb259fb0 to 0xeb259ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e7c0 INFO: task kworker/0:508:4706 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b761e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:509:4708 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:509 state:D stack:0 pid:4708 tgid:4708 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb261d84 r8:00000002 r7:60000113 r6:eb261d8c r5:853f9800 r4:853f9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853f9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb261e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ea40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853f9800 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ae38c r4:852ae000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ae38c r4:85377e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853f9800 r8:85377eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377e80 r8:80287e08 r7:eb215e60 r6:853a0500 r5:853f9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb261fb0 to 0xeb261ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539e8c0 INFO: task kworker/0:509:4708 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b76a9000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:510:4711 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:510 state:D stack:0 pid:4711 tgid:4711 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb26dd84 r8:00000002 r7:60000113 r6:eb26dd8c r5:853fa400 r4:853fa400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fa400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb26de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539eb80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853fa400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852ae78c r4:852ae400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852ae78c r4:85377f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fa400 r8:85377f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377f00 r8:80287e08 r7:eb215e60 r6:853a0580 r5:853fa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb26dfb0 to 0xeb26dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539ea80 INFO: task kworker/0:510:4711 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b78d4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:511:4712 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:511 state:D stack:0 pid:4712 tgid:4712 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb271d84 r8:00000002 r7:60000113 r6:eb271d8c r5:853fb000 r4:853fb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb271e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ecc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853fb000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852aeb8c r4:852ae800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852aeb8c r4:85377f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fb000 r8:85377fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85377f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85377f80 r8:80287e08 r7:eb215e60 r6:853a0600 r5:853fb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb271fb0 to 0xeb271ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539ebc0 INFO: task kworker/0:511:4712 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b7d3f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:512:4715 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:512 state:D stack:0 pid:4715 tgid:4715 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb27dd84 r8:00000002 r7:60000013 r6:eb27dd8c r5:853fbc00 r4:853fbc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fbc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb27de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8538b940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853fbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead8b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852af38c r4:852af000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852af38c r4:85427000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fbc00 r8:8542702c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427000 r8:80287e08 r7:eb215e60 r6:853a0680 r5:853fbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb27dfb0 to 0xeb27dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539ed00 INFO: task kworker/0:512:4715 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b7fa4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:513:4717 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:513 state:D stack:0 pid:4717 tgid:4717 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb285d84 r8:00000002 r7:60000013 r6:eb285d8c r5:853fc800 r4:853fc800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fc800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb285e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853fc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadbf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852afb8c r4:852af800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852afb8c r4:85427080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fc800 r8:854270ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427080 r8:80287e08 r7:eb27de60 r6:853a0700 r5:853fc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb285fb0 to 0xeb285ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539ef40 INFO: task kworker/0:513:4717 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b7fa4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:514:4718 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:514 state:D stack:0 pid:4718 tgid:4718 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb295d84 r8:00000002 r7:60000113 r6:eb295d8c r5:853ed400 r4:853ed400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ed400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb295e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8539ed00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ed400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadab000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852af78c r4:852af400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852af78c r4:85427100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ed400 r8:8542712c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427100 r8:80287e08 r7:eb285e60 r6:853a0780 r5:853ed400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb295fb0 to 0xeb295ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8539ef40 INFO: task kworker/0:514:4718 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b8194000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:515:4720 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:515 state:D stack:0 pid:4720 tgid:4720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb29dd84 r8:00000002 r7:60000113 r6:eb29dd8c r5:853fd400 r4:853fd400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb29de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853fd400 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b178c r4:852b1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b178c r4:85427180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fd400 r8:854271ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427180 r8:80287e08 r7:eb285e60 r6:853a0800 r5:853fd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb29dfb0 to 0xeb29dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85359f40 INFO: task kworker/0:515:4720 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b8194000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:516:4722 blocked for more than 466 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:516 state:D stack:0 pid:4722 tgid:4722 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a5d84 r8:00000002 r7:60000113 r6:eb2a5d8c r5:853fec00 r4:853fec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853fec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852aff8c r4:852afc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852aff8c r4:85427200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853fec00 r8:8542722c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427200 r8:80287e08 r7:eb29de60 r6:853a0880 r5:853fec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a5fb0 to 0xeb2a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542b1c0 INFO: task kworker/0:516:4722 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b8556000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:517:4724 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:517 state:D stack:0 pid:4724 tgid:4724 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2add84 r8:00000002 r7:60000113 r6:eb2add8c r5:85400c00 r4:85400c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85400c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b2c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85400c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b038c r4:852b0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b038c r4:85427280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85400c00 r8:854272ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427280 r8:80287e08 r7:eb29de60 r6:853a0900 r5:85400c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2adfb0 to 0xeb2adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542b080 INFO: task kworker/0:517:4724 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b870a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:518:4726 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:518 state:D stack:0 pid:4726 tgid:4726 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2b5d84 r8:00000002 r7:60000113 r6:eb2b5d8c r5:85402400 r4:85402400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85402400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2b5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85402400 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b078c r4:852b0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b078c r4:85427300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85402400 r8:8542732c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427300 r8:80287e08 r7:eb29de60 r6:853a0980 r5:85402400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b5fb0 to 0xeb2b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542b200 INFO: task kworker/0:518:4726 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b8a4c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:519:4728 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:519 state:D stack:0 pid:4728 tgid:4728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2c5d84 r8:00000002 r7:60000113 r6:eb2c5d8c r5:85401800 r4:85401800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85401800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2c5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85401800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b0b8c r4:852b0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b0b8c r4:85427380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85401800 r8:854273ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427380 r8:80287e08 r7:eb29de60 r6:853a0a00 r5:85401800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2c5fb0 to 0xeb2c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542b3c0 INFO: task kworker/0:519:4728 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b8be9000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:520:4730 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:520 state:D stack:0 pid:4730 tgid:4730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2cdd84 r8:00000002 r7:60000113 r6:eb2cdd8c r5:85400000 r4:85400000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85400000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85400000 r7:00000000 r6:83018000 r5:00001000 r4:7f0bd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b0f8c r4:852b0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b0f8c r4:85427400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85400000 r8:8542742c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427400 r8:80287e08 r7:eb29de60 r6:853a0a80 r5:85400000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2cdfb0 to 0xeb2cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542b4c0 INFO: task kworker/0:520:4730 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b8c70000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:521:4732 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:521 state:D stack:0 pid:4732 tgid:4732 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d5d84 r8:00000002 r7:60000013 r6:eb2d5d8c r5:85404800 r4:85404800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85404800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85404800 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafaf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b138c r4:852b1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b138c r4:85427480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85404800 r8:854274ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427480 r8:80287e08 r7:eb29de60 r6:853a0b00 r5:85404800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d5fb0 to 0xeb2d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542b600 INFO: task kworker/0:521:4732 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b8f29000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:522:4734 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:522 state:D stack:0 pid:4734 tgid:4734 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2d9d84 r8:00000002 r7:60000113 r6:eb2d9d8c r5:85403c00 r4:85403c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85403c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2d9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542bb00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85403c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0069000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b1f8c r4:852b1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b1f8c r4:85427500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85403c00 r8:8542752c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427500 r8:80287e08 r7:eb29de60 r6:853a0b80 r5:85403c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2d9fb0 to 0xeb2d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542b600 INFO: task kworker/0:522:4734 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b8f29000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:523:4736 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:523 state:D stack:0 pid:4736 tgid:4736 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e1d84 r8:00000002 r7:60000113 r6:eb2e1d8c r5:85403000 r4:85403000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85403000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542b9c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85403000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b1b8c r4:852b1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b1b8c r4:85427580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85403000 r8:854275ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427580 r8:80287e08 r7:eb2d9e60 r6:853a0c00 r5:85403000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e1fb0 to 0xeb2e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542b600 INFO: task kworker/0:523:4736 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b9207000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:524:4738 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:524 state:D stack:0 pid:4738 tgid:4738 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2e9d84 r8:00000002 r7:60000013 r6:eb2e9d8c r5:85406c00 r4:85406c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85406c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85406c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b338c r4:852b3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b338c r4:85427600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85406c00 r8:8542762c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427600 r8:80287e08 r7:eb2d9e60 r6:853a0c80 r5:85406c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2e9fb0 to 0xeb2e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542ba00 INFO: task kworker/0:524:4738 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b942e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:525:4741 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:525 state:D stack:0 pid:4741 tgid:4741 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb315d84 r8:00000002 r7:60000013 r6:eb315d8c r5:85406000 r4:85406000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85406000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb315e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542bc40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85406000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e045f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b238c r4:852b2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b238c r4:85427680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85406000 r8:854276ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427680 r8:80287e08 r7:eb2e9e60 r6:853a0d00 r5:85406000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb315fb0 to 0xeb315ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542bb40 INFO: task kworker/0:525:4741 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b969d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:526:4742 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:526 state:D stack:0 pid:4742 tgid:4742 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb319d84 r8:00000002 r7:60000013 r6:eb319d8c r5:85408000 r4:85408000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85408000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb319e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542be40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85408000 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e065d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b278c r4:852b2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b278c r4:85427700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85408000 r8:8542772c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427700 r8:80287e08 r7:eb2e9e60 r6:853a0d80 r5:85408000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb319fb0 to 0xeb319ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8542bc80 INFO: task kworker/0:526:4742 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b99ea000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:527:4744 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:527 state:D stack:0 pid:4744 tgid:4744 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb321d84 r8:00000002 r7:60000013 r6:eb321d8c r5:85409800 r4:85409800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85409800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb321e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85420500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85409800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0769000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b2b8c r4:852b2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b2b8c r4:85427780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85409800 r8:854277ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427780 r8:80287e08 r7:eb2e9e60 r6:853a0e00 r5:85409800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb321fb0 to 0xeb321ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85420ec0 INFO: task kworker/0:527:4744 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b9b6f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:528:4746 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:528 state:D stack:0 pid:4746 tgid:4746 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb329d84 r8:00000002 r7:60000013 r6:eb329d8c r5:8540b000 r4:8540b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb329e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8542bec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540b000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e4851000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b2f8c r4:852b2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b2f8c r4:85427800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540b000 r8:8542782c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427800 r8:80287e08 r7:eb2e9e60 r6:853a0e80 r5:8540b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb329fb0 to 0xeb329ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85420580 INFO: task kworker/0:528:4746 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: b9e89000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:529:4749 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:529 state:D stack:0 pid:4749 tgid:4749 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb335d84 r8:00000002 r7:60000113 r6:eb335d8c r5:8540a400 r4:8540a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb335e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8540a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab05000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b3f8c r4:852b3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b3f8c r4:85427880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540a400 r8:854278ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427880 r8:80287e08 r7:eb2e9e60 r6:853a0f00 r5:8540a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb335fb0 to 0xeb335ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544c000 INFO: task kworker/0:529:4749 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ba154000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:530:4750 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:530 state:D stack:0 pid:4750 tgid:4750 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb201d84 r8:00000002 r7:60000113 r6:eb201d8c r5:84878c00 r4:84878c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84878c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb201e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84878c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaabb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b378c r4:852b3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b378c r4:85427900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84878c00 r8:8542792c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427900 r8:80287e08 r7:eb335e60 r6:85427980 r5:84878c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb201fb0 to 0xeb201ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544c2c0 INFO: task kworker/0:530:4750 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ba154000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:531:4753 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:531 state:D stack:0 pid:4753 tgid:4753 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb331d84 r8:00000002 r7:60000113 r6:eb331d8c r5:84879800 r4:84879800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84879800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb331e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84879800 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaae5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:852b3b8c r4:852b3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:852b3b8c r4:85427a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84879800 r8:85427a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427a00 r8:80287e08 r7:eb335e60 r6:85427a80 r5:84879800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb331fb0 to 0xeb331ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544c440 INFO: task kworker/0:531:4753 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ba532000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:532:4756 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:532 state:D stack:0 pid:4756 tgid:4756 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb339d84 r8:00000002 r7:60000113 r6:eb339d8c r5:8487a400 r4:8487a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb339e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487a400 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546038c r4:85460000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546038c r4:85427b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487a400 r8:85427b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427b00 r8:80287e08 r7:eb335e60 r6:85427b80 r5:8487a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb339fb0 to 0xeb339ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544c800 INFO: task kworker/0:532:4756 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ba565000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:533:4757 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:533 state:D stack:0 pid:4757 tgid:4757 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb341d84 r8:00000002 r7:60000013 r6:eb341d8c r5:8487b000 r4:8487b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb341e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544cd80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487b000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadf3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546138c r4:85461000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546138c r4:85427c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487b000 r8:85427c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427c00 r8:80287e08 r7:eb339e60 r6:85427c80 r5:8487b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb341fb0 to 0xeb341ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544c580 INFO: task kworker/0:533:4757 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: baa9c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:534:4759 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:534 state:D stack:0 pid:4759 tgid:4759 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb345d84 r8:00000002 r7:60000013 r6:eb345d8c r5:8487bc00 r4:8487bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb345e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c6c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546078c r4:85460400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546078c r4:85427d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487bc00 r8:85427d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427d00 r8:80287e08 r7:eb341e60 r6:85427d80 r5:8487bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb345fb0 to 0xeb345ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544ca00 INFO: task kworker/0:534:4759 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: baa9c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:535:4761 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:535 state:D stack:0 pid:4761 tgid:4761 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb349d84 r8:00000002 r7:60000113 r6:eb349d8c r5:8487c800 r4:8487c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb349e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544c8c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487c800 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85460b8c r4:85460800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85460b8c r4:85427e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487c800 r8:85427e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427e00 r8:80287e08 r7:eb341e60 r6:85427e80 r5:8487c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb349fb0 to 0xeb349ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544c880 INFO: task kworker/0:535:4761 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bad81000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:536:4763 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:536 state:D stack:0 pid:4763 tgid:4763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb34dd84 r8:00000002 r7:60000113 r6:eb34dd8c r5:8487d400 r4:8487d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb34de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544ca40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487d400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab97000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85460f8c r4:85460c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85460f8c r4:85427f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487d400 r8:85427f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85427f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85427f00 r8:80287e08 r7:eb341e60 r6:85427f80 r5:8487d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb34dfb0 to 0xeb34dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544c980 INFO: task kworker/0:536:4763 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bae05000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:537:4765 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:537 state:D stack:0 pid:4765 tgid:4765 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb355d84 r8:00000002 r7:60000013 r6:eb355d8c r5:8487ec00 r4:8487ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb355e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544ce80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546178c r4:85461400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546178c r4:85499000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487ec00 r8:8549902c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499000 r8:80287e08 r7:eb341e60 r6:85499080 r5:8487ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb355fb0 to 0xeb355ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544cbc0 INFO: task kworker/0:537:4765 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bb0ae000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:538:4767 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:538 state:D stack:0 pid:4767 tgid:4767 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb359d84 r8:00000002 r7:60000113 r6:eb359d8c r5:853c8c00 r4:853c8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb359e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85457680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546278c r4:85462400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546278c r4:85499100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c8c00 r8:8549912c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499100 r8:80287e08 r7:eb355e60 r6:85499180 r5:853c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb359fb0 to 0xeb359ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544cfc0 INFO: task kworker/0:538:4767 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bb0eb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:283:4770 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:283 state:D stack:0 pid:4770 tgid:4770 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb351d84 r8:00000002 r7:60000013 r6:eb351d8c r5:8540d400 r4:8540d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb351e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85449900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8540d400 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532cf8c r4:8532cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532cf8c r4:853a0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540d400 r8:853a0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:853a0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:853a0f80 r8:80287e08 r7:eb0f5e60 r6:8545a000 r5:8540d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb351fb0 to 0xeb351ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85449d80 INFO: task kworker/1:283:4770 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bb0eb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:539:4772 blocked for more than 467 seconds. Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85457200 r4:85499200 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:284:4773 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:284 state:D stack:0 pid:4773 tgid:4773 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1f5d84 r8:00000002 r7:60000113 r6:eb1f5d8c r5:8540e000 r4:8540e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540e000 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8532cb8c r4:8532c800 r4:00000001 INFO: task kworker/1:284:4773 is blocked on a mutex likely owned by task kworker/0:173:3630. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r5:8540ec00 r4:8291a680 r4:00000000 r5:8532e38c r4:8532e000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540ec00 r8:8545a22c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8545a200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8545a200 r8:80287e08 r7:eb351e60 r6:8545a280 r5:8540ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb365fb0 to 0xeb365ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85449980 INFO: task kworker/1:285:4777 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bb8fc000 e0123000 00000001 80239b98 7f4df000 00000001 r5:80050013 r4:80239bb0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb36dd84 r8:00000002 r7:60000113 r6:eb36dd8c r5:8540c800 r4:8540c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8540c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb36de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85457400 r5:85461f8c r4:85461c00 r10:61c88647 r9:8540c800 r8:854992ac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:82ac21e4 r5:84b4ef8c r4:84b4ec00 1fa0: 00000000 00000000 00000000 00000000 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf07000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546238c r4:85462000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546238c r4:85499300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8540bc00 r8:8549932c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499300 r8:80287e08 r7:eb359e60 r6:8545a380 r5:8540bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb371fb0 to 0xeb371ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85457300 INFO: task kworker/0:541:4781 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bbdbc000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb379d84 r8:00000002 r7:60000013 r6:eb379d8c r5:85405400 r4:85405400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85405400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb379e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85457780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85405400 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85462b8c r4:85462800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85462b8c r4:85499380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85405400 r8:854993ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499380 r8:80287e08 r7:eb359e60 r6:8545a400 r5:85405400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb379fb0 to 0xeb379ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854575c0 INFO: task kworker/0:542:4783 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bc080000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:543:4784 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:543 state:D stack:0 pid:4784 tgid:4784 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb37dd84 r8:00000002 r7:60000013 r6:eb37dd8c r5:85410000 r4:85410000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85410000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:85462f8c r4:85462c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85462f8c r4:85499400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85410000 r8:8549942c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499400 r8:80287e08 r7:eb379e60 r6:8545a480 r5:85410000 INFO: task kworker/0:543:4784 is blocked on a mutex likely owned by task kworker/0:173:3630. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85499480 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb389fb0 to 0xeb389ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85457880 INFO: task kworker/0:544:4787 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 Exception stack(0xe0431d28 to 0xe0431d70) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe0431fb0 to 0xe0431ff8) task:kworker/1:286 state:D stack:0 pid:4788 tgid:4788 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:8532d38c r4:8532d000 r10:00000000 r9:8545a580 r8:80287e08 r7:eb365e60 r6:8545a600 r5:85410c00 1d60: 80230ad0 80239bb0 80050013 ffffffff r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:545:4789 blocked for more than 467 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:545 state:D stack:0 pid:4789 tgid:4789 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb391d84 r8:00000002 r7:60000113 r6:eb391d8c r5:85413000 r4:85413000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85413000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb391e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85457e00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85413000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb007000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85463f8c r4:85463c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85463f8c r4:85499500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85413000 r8:8549952c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499500 r8:80287e08 r7:eb389e60 r6:8545a680 r5:85413000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb391fb0 to 0xeb391ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85457b00 INFO: task kworker/0:545:4789 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r5:80050013 r4:80239bb0 r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:546:4791 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:546 state:D stack:0 pid:4791 tgid:4791 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb399d84 r8:00000002 r7:60000013 r6:eb399d8c r5:85411800 r4:85411800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85411800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb399e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85457b40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85411800 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafdb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546378c r4:85463400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546378c r4:85499580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85411800 r8:854995ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499580 r8:80287e08 r7:eb391e60 r6:8545a700 r5:85411800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb399fb0 to 0xeb399ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85457940 INFO: task kworker/0:546:4791 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bcc0b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:84aeca80 r4:00000001 Exception stack(0xe0431fb0 to 0xe0431ff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 task:kworker/0:547 state:D stack:0 pid:4793 tgid:4793 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85413c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85457c00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85413c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafeb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85463b8c r4:85463800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85463b8c r4:85499600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85413c00 r8:8549962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499600 r8:80287e08 r7:eb391e60 r6:8545a780 r5:85413c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a1fb0 to 0xeb3a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85457a80 INFO: task kworker/0:547:4793 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bcf3c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:548:4795 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:548 state:D stack:0 pid:4795 tgid:4795 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3a9d84 r8:00000002 r7:60000013 r6:eb3a9d8c r5:85414800 r4:85414800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85414800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544cfc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85414800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb02f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546478c r4:85464400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546478c r4:85499680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85414800 r8:854996ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499680 r8:80287e08 r7:eb391e60 r6:8545a800 r5:85414800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3a9fb0 to 0xeb3a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85457dc0 INFO: task kworker/0:548:4795 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bd47e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:549:4797 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:549 state:D stack:0 pid:4797 tgid:4797 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3b1d84 r8:00000002 r7:60000113 r6:eb3b1d8c r5:85416c00 r4:85416c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85416c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85457f00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85416c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb011000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546438c r4:85464000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546438c r4:85499700 r10:61c88647 r9:85416c00 r8:8549972c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb3b1fb0 to 0xeb3b1ff8) INFO: task kworker/0:549:4797 is blocked on a mutex likely owned by task kworker/0:173:3630. Exception stack(0xe0431d28 to 0xe0431d70) r4:82ac21e4 r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aeca80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c1d84 r8:00000002 r7:60000113 r6:eb3c1d8c r5:85416000 r4:85416000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85416000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549c040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85416000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb063000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85464b8c r4:85464800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85464b8c r4:85499780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85416000 r8:854997ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499780 r8:80287e08 r7:eb3a9e60 r6:8545a900 r5:85416000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c1fb0 to 0xeb3c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85457e80 INFO: task kworker/0:550:4799 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bd86d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r5:84b4ef8c r4:84b4ec00 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/1:287 state:D stack:0 pid:4802 tgid:4802 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85415400 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8532db8c r4:8532d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532db8c r4:8545a980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85415400 r8:8545a9ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8545a980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8545a980 r8:80287e08 r7:eb365e60 r6:8545aa00 r5:85415400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb369fb0 to 0xeb369ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498b40 INFO: task kworker/1:287:4802 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bd86d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:551:4803 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:551 state:D stack:0 pid:4803 tgid:4803 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c5d84 r8:00000002 r7:60000013 r6:eb3c5d8c r5:853fe000 r4:853fe000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853fe000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549c200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853fe000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85464f8c r4:85464c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85499800 r8:80287e08 r7:eb3c1e60 r6:8545aa80 r5:853fe000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bddfd000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:552:4805 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:552 state:D stack:0 pid:4805 tgid:4805 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3c9d84 r8:00000002 r7:60000113 r6:eb3c9d8c r5:85418000 r4:85418000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85418000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549c880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85418000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea90b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546638c r4:85466000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546638c r4:85499880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85418000 r8:854998ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499880 r8:80287e08 r7:eb3c5e60 r6:8545ab00 r5:85418000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3c9fb0 to 0xeb3c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c1c0 INFO: task kworker/0:552:4805 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: be08f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:553:4807 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:553 state:D stack:0 pid:4807 tgid:4807 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d1d84 r8:00000002 r7:60000013 r6:eb3d1d8c r5:85418c00 r4:85418c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85418c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549c380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85418c00 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df881000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546538c r4:85465000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546538c r4:85499900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85418c00 r8:8549992c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499900 r8:80287e08 r7:eb3c9e60 r6:8545ab80 r5:85418c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d1fb0 to 0xeb3d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c1c0 INFO: task kworker/0:553:4807 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: be08f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:554:4809 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:554 state:D stack:0 pid:4809 tgid:4809 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb1cdd84 r8:00000002 r7:60000013 r6:eb1cdd8c r5:85419800 r4:85419800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85419800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb1cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549c480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85419800 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfb6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546578c r4:85465400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546578c r4:85499980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85419800 r8:854999ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499980 r8:80287e08 r7:eb3c9e60 r6:8545ac00 r5:85419800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb1cdfb0 to 0xeb1cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c4c0 INFO: task kworker/0:554:4809 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: be3a7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:555:4811 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:555 state:D stack:0 pid:4811 tgid:4811 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb231d84 r8:00000002 r7:60000113 r6:eb231d8c r5:8541a400 r4:8541a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb231e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549c540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541a400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfda5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85465b8c r4:85465800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85465b8c r4:85499a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541a400 r8:85499a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499a00 r8:80287e08 r7:eb3c9e60 r6:8545ac80 r5:8541a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb231fb0 to 0xeb231ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c580 INFO: task kworker/0:555:4811 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: be623000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:556:4812 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:556 state:D stack:0 pid:4812 tgid:4812 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb255d84 r8:00000002 r7:60000013 r6:eb255d8c r5:8541b000 r4:8541b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb255e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549c780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541b000 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e8881000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85465f8c r4:85465c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85465f8c r4:85499a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541b000 r8:85499aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499a80 r8:80287e08 r7:eb3c9e60 r6:8545ad00 r5:8541b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb255fb0 to 0xeb255ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c580 INFO: task kworker/0:556:4812 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: be8ca000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:557:4817 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:557 state:D stack:0 pid:4817 tgid:4817 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb275d84 r8:00000002 r7:60000113 r6:eb275d8c r5:8541d400 r4:8541d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb275e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549c980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541d400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea94d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546678c r4:85466400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546678c r4:85499b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541d400 r8:85499b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499b00 r8:80287e08 r7:eb3c9e60 r6:8545ad80 r5:8541d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb275fb0 to 0xeb275ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c800 INFO: task kworker/0:557:4817 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: be8ca000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:558:4819 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:558 state:D stack:0 pid:4819 tgid:4819 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3d5d84 r8:00000002 r7:60000013 r6:eb3d5d8c r5:8541c800 r4:8541c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549ca40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541c800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa51000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85466b8c r4:85466800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85466b8c r4:85499b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541c800 r8:85499bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499b80 r8:80287e08 r7:eb275e60 r6:8545ae00 r5:8541c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3d5fb0 to 0xeb3d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c900 INFO: task kworker/0:558:4819 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bec0a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:559:4821 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:559 state:D stack:0 pid:4821 tgid:4821 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3ddd84 r8:00000002 r7:60000013 r6:eb3ddd8c r5:8541ec00 r4:8541ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549cd80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabf7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546738c r4:85467000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546738c r4:85499c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541ec00 r8:85499c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499c00 r8:80287e08 r7:eb3d5e60 r6:8545ae80 r5:8541ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3ddfb0 to 0xeb3ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c900 INFO: task kworker/0:559:4821 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bef2c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:560:4822 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:560 state:D stack:0 pid:4822 tgid:4822 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e1d84 r8:00000002 r7:60000113 r6:eb3e1d8c r5:8541bc00 r4:8541bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549cb80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabcd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85466f8c r4:85466c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85466f8c r4:85499c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541bc00 r8:85499cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499c80 r8:80287e08 r7:eb3dde60 r6:8545af00 r5:8541bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e1fb0 to 0xeb3e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549cd40 INFO: task kworker/0:560:4822 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bf3d8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:561:4824 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:561 state:D stack:0 pid:4824 tgid:4824 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e9d84 r8:00000002 r7:60000013 r6:eb3e9d8c r5:85510c00 r4:85510c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85510c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85498640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85510c00 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85467f8c r4:85467c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85467f8c r4:85499d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85510c00 r8:85499d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499d00 r8:80287e08 r7:eb3dde60 r6:8545af80 r5:85510c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e9fb0 to 0xeb3e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549cbc0 INFO: task kworker/0:561:4824 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bf509000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:288:4827 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:288 state:D stack:0 pid:4827 tgid:4827 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb375d84 r8:00000002 r7:60000113 r6:eb375d8c r5:85511800 r4:85511800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85511800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb375e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ac640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85511800 r7:00000000 r6:83018200 r5:00001000 r4:7f065000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac8d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532df8c r4:8532dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532df8c r4:854af000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85511800 r8:854af02c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854af000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854af000 r8:80287e08 r7:eb365e60 r6:854af080 r5:85511800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb375fb0 to 0xeb375ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ac3c0 INFO: task kworker/1:288:4827 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bf509000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:562:4828 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:562 state:D stack:0 pid:4828 tgid:4828 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3edd84 r8:00000002 r7:60000113 r6:eb3edd8c r5:85512400 r4:85512400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85512400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8549cf80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85512400 r7:00000000 r6:83018000 r5:00001000 r4:7f063000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac6b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546778c r4:85467400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546778c r4:85499d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85512400 r8:85499dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499d80 r8:80287e08 r7:eb3e9e60 r6:854af100 r5:85512400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3edfb0 to 0xeb3edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549cbc0 INFO: task kworker/0:562:4828 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bf853000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:289:4831 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:289 state:D stack:0 pid:4831 tgid:4831 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3e5d84 r8:00000002 r7:60000113 r6:eb3e5d8c r5:85513000 r4:85513000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85513000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3e5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854dbe80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85513000 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eada1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547ef8c r4:8547ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8547ef8c r4:854af180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85513000 r8:854af1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854af180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854af180 r8:80287e08 r7:eb365e60 r6:854af200 r5:85513000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3e5fb0 to 0xeb3e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ac600 INFO: task kworker/1:289:4831 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bfc4e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:563:4833 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:563 state:D stack:0 pid:4833 tgid:4833 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f5d84 r8:00000002 r7:60000113 r6:eb3f5d8c r5:85514800 r4:85514800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85514800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85449440 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85514800 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85467b8c r4:85467800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85467b8c r4:85499e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85514800 r8:85499e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499e00 r8:80287e08 r7:eb3e9e60 r6:854af280 r5:85514800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f5fb0 to 0xeb3f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8549c640 INFO: task kworker/0:563:4833 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: bff4e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:564:4834 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:564 state:D stack:0 pid:4834 tgid:4834 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f9d84 r8:00000002 r7:60000113 r6:eb3f9d8c r5:85515400 r4:85515400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85515400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a92c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85515400 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85468b8c r4:85468800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85468b8c r4:85499e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85515400 r8:85499eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499e80 r8:80287e08 r7:eb3e9e60 r6:854af300 r5:85515400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f9fb0 to 0xeb3f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85498500 INFO: task kworker/0:564:4834 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c00d5000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:290:4836 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:290 state:D stack:0 pid:4836 tgid:4836 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3bdd84 r8:00000002 r7:60000113 r6:eb3bdd8c r5:85516000 r4:85516000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85516000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854acc80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85516000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532e78c r4:8532e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532e78c r4:854af380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85516000 r8:854af3ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854af380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854af380 r8:80287e08 r7:eb3e5e60 r6:854af400 r5:85516000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3bdfb0 to 0xeb3bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854aca00 INFO: task kworker/1:290:4836 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c0314000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:565:4838 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:565 state:D stack:0 pid:4838 tgid:4838 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb3f1d84 r8:00000002 r7:60000113 r6:eb3f1d8c r5:85516c00 r4:85516c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85516c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb3f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9100 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85516c00 r7:00000000 r6:83018000 r5:00001000 r4:7f071000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546838c r4:85468000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546838c r4:85499f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85516c00 r8:85499f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499f00 r8:80287e08 r7:eb3f9e60 r6:854af500 r5:85516c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb3f1fb0 to 0xeb3f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85457540 INFO: task kworker/0:565:4838 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c0314000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:291:4839 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:291 state:D stack:0 pid:4839 tgid:4839 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb415d84 r8:00000002 r7:60000113 r6:eb415d8c r5:85513c00 r4:85513c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85513c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb415e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854acec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85513c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead25000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532ef8c r4:8532ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532ef8c r4:854af580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85513c00 r8:854af5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854af580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854af580 r8:80287e08 r7:eb3e5e60 r6:854af600 r5:85513c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb415fb0 to 0xeb415ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854acdc0 INFO: task kworker/1:291:4839 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c0729000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/1:292 state:D stack:0 pid:4843 tgid:4843 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb41dd84 r8:00000002 r7:60000113 r6:eb41dd8c r5:85510000 r4:85510000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85510000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb41de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85510000 r7:00000000 r6:83018200 r5:00001000 r4:7f081000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafc7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546a38c r4:8546a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8546a38c r4:854af680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85510000 r8:854af6ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854af680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854af680 r8:80287e08 r7:eb3e5e60 r6:854af700 r5:85510000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb41dfb0 to 0xeb41dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ac700 INFO: task kworker/1:292:4843 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c0729000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:566:4845 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:566 state:D stack:0 pid:4845 tgid:4845 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb425d84 r8:00000002 r7:60000113 r6:eb425d8c r5:85558c00 r4:85558c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546878c r4:85468400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546878c r4:85499f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85558c00 r8:85499fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85499f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85499f80 r8:80287e08 r7:eb3f9e60 r6:854af780 r5:85558c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb425fb0 to 0xeb425ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9180 INFO: task kworker/0:566:4845 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c0ae8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:567:4847 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:567 state:D stack:0 pid:4847 tgid:4847 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb429d84 r8:00000002 r7:60000113 r6:eb429d8c r5:85559800 r4:85559800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85559800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb429e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85559800 r7:00000000 r6:83018000 r5:00001000 r4:7f077000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85468f8c r4:85468c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85468f8c r4:854a5000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85559800 r8:854a502c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5000 r8:80287e08 r7:eb3f9e60 r6:854af800 r5:85559800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb429fb0 to 0xeb429ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9300 INFO: task kworker/0:567:4847 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c0ae8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:568:4849 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:568 state:D stack:0 pid:4849 tgid:4849 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb431d84 r8:00000002 r7:60000013 r6:eb431d8c r5:8555b000 r4:8555b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb431e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555b000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85469b8c r4:85469800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85469b8c r4:854a5080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555b000 r8:854a50ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5080 r8:80287e08 r7:eb429e60 r6:854af880 r5:8555b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb431fb0 to 0xeb431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a94c0 INFO: task kworker/0:568:4849 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c0c59000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:569:4851 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:569 state:D stack:0 pid:4851 tgid:4851 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb439d84 r8:00000002 r7:60000013 r6:eb439d8c r5:8555c800 r4:8555c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb439e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9600 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555c800 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadcb000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546938c r4:85469000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546938c r4:854a5100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555c800 r8:854a512c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5100 r8:80287e08 r7:eb431e60 r6:854af900 r5:8555c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb439fb0 to 0xeb439ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a94c0 INFO: task kworker/0:569:4851 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c0f2c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:570:4852 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:570 state:D stack:0 pid:4852 tgid:4852 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb43dd84 r8:00000002 r7:60000013 r6:eb43dd8c r5:8555a400 r4:8555a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb43de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555a400 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf59000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546978c r4:85469400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546978c r4:854a5180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555a400 r8:854a51ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5180 r8:80287e08 r7:eb431e60 r6:854af980 r5:8555a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb43dfb0 to 0xeb43dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9580 INFO: task kworker/0:570:4852 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c1109000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:571:4854 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:571 state:D stack:0 pid:4854 tgid:4854 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb441d84 r8:00000002 r7:60000013 r6:eb441d8c r5:8555d400 r4:8555d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb441e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9a40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555d400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85469f8c r4:85469c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85469f8c r4:854a5200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555d400 r8:854a522c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5200 r8:80287e08 r7:eb431e60 r6:854afa00 r5:8555d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb441fb0 to 0xeb441ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a96c0 INFO: task kworker/0:571:4854 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c1266000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:572:4857 blocked for more than 468 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:572 state:D stack:0 pid:4857 tgid:4857 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb445d84 r8:00000002 r7:60000113 r6:eb445d8c r5:8555e000 r4:8555e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb445e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9c80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555e000 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb01b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546a78c r4:8546a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546a78c r4:854a5280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555e000 r8:854a52ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5280 r8:80287e08 r7:eb441e60 r6:854afa80 r5:8555e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb445fb0 to 0xeb445ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9880 INFO: task kworker/0:572:4857 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c1449000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:293:4859 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:293 state:D stack:0 pid:4859 tgid:4859 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb435d84 r8:00000002 r7:60000113 r6:eb435d8c r5:8555ec00 r4:8555ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb435e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c0740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8555ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:8532f78c r4:8532f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eaea1d84 r8:00000002 r7:60000113 r6:eaea1d8c r5:85558000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8546b78c r4:8546b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85558000 r8:854a532c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0439000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:574:4863 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:574 state:D stack:0 pid:4863 tgid:4863 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2ddd84 r8:00000002 r7:60000113 r6:eb2ddd8c r5:8555bc00 r4:8555bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8555bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9e00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8555bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f00d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa17000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546ab8c r4:8546a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546ab8c r4:854a5380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8555bc00 r8:854a53ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5380 r8:80287e08 r7:eaea1e60 r6:854afc80 r5:8555bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2ddfb0 to 0xeb2ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9d80 INFO: task kworker/0:574:4863 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c167a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:575:4864 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:575 state:D stack:0 pid:4864 tgid:4864 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2edd84 r8:00000002 r7:60000013 r6:eb2edd8c r5:85500000 r4:85500000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85500000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854a9d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85500000 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dff0b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546af8c r4:8546ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546af8c r4:854a5400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85500000 r8:854a542c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5400 r8:80287e08 r7:eaea1e60 r6:854afd00 r5:85500000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2edfb0 to 0xeb2edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9480 INFO: task kworker/0:575:4864 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c1cbc000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:576:4866 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:576 state:D stack:0 pid:4866 tgid:4866 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb44dd84 r8:00000002 r7:60000113 r6:eb44dd8c r5:85501800 r4:85501800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85501800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb44de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ac7c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85501800 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0117000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546b38c r4:8546b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546b38c r4:854a5480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85501800 r8:854a54ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5480 r8:80287e08 r7:eaea1e60 r6:854afd80 r5:85501800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb44dfb0 to 0xeb44dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9f40 INFO: task kworker/0:576:4866 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c1fa8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:577:4868 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:577 state:D stack:0 pid:4868 tgid:4868 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb455d84 r8:00000002 r7:60000113 r6:eb455d8c r5:85503000 r4:85503000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85503000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb455e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85503000 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaacf000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546c38c r4:8546c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546c38c r4:854a5500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85503000 r8:854a552c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5500 r8:80287e08 r7:eaea1e60 r6:854afe00 r5:85503000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb455fb0 to 0xeb455ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854a9b40 INFO: task kworker/0:577:4868 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c24de000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:578:4870 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:578 state:D stack:0 pid:4870 tgid:4870 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb45dd84 r8:00000002 r7:60000113 r6:eb45dd8c r5:85503c00 r4:85503c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85503c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb45de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85503c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e484f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546bb8c r4:8546b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546bb8c r4:854a5580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85503c00 r8:854a55ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5580 r8:80287e08 r7:eb455e60 r6:854afe80 r5:85503c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb45dfb0 to 0xeb45dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555280 INFO: task kworker/0:578:4870 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c2977000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:579:4872 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:579 state:D stack:0 pid:4872 tgid:4872 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb465d84 r8:00000002 r7:60000113 r6:eb465d8c r5:85504800 r4:85504800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85504800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb465e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855552c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85504800 r7:00000000 r6:83018000 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa79000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546bf8c r4:8546bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546bf8c r4:854a5600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85504800 r8:854a562c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5600 r8:80287e08 r7:eb455e60 r6:854aff00 r5:85504800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb465fb0 to 0xeb465ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555100 INFO: task kworker/0:579:4872 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c2db0000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:580:4875 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:580 state:D stack:0 pid:4875 tgid:4875 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb471d84 r8:00000002 r7:60000113 r6:eb471d8c r5:85502400 r4:85502400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85502400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb471e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855557c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85502400 r7:00000000 r6:83018000 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546cf8c r4:8546cc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546cf8c r4:854a5680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85502400 r8:854a56ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5680 r8:80287e08 r7:eb455e60 r6:854aff80 r5:85502400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb471fb0 to 0xeb471ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555200 INFO: task kworker/0:580:4875 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c3b86000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:581:4876 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:581 state:D stack:0 pid:4876 tgid:4876 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb475d84 r8:00000002 r7:60000013 r6:eb475d8c r5:85500c00 r4:85500c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85500c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb475e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85500c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab1f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546c78c r4:8546c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546c78c r4:854a5700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85500c00 r8:854a572c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5700 r8:80287e08 r7:eb471e60 r6:854bf000 r5:85500c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb475fb0 to 0xeb475ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855553c0 INFO: task kworker/0:581:4876 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c3b86000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:582:4878 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:582 state:D stack:0 pid:4878 tgid:4878 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb47dd84 r8:00000002 r7:60000113 r6:eb47dd8c r5:85506c00 r4:85506c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85506c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb47de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85506c00 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab4d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546cb8c r4:8546c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546cb8c r4:854a5780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85506c00 r8:854a57ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5780 r8:80287e08 r7:eb471e60 r6:854bf080 r5:85506c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb47dfb0 to 0xeb47dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855554c0 INFO: task kworker/0:582:4878 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c3b86000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:583:4880 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:583 state:D stack:0 pid:4880 tgid:4880 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb485d84 r8:00000002 r7:60000113 r6:eb485d8c r5:85506000 r4:85506000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85506000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb485e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85506000 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafe9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546f38c r4:8546f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546f38c r4:854a5800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85506000 r8:854a582c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5800 r8:80287e08 r7:eb471e60 r6:854bf100 r5:85506000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb485fb0 to 0xeb485ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555680 INFO: task kworker/0:583:4880 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c4220000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:584:4883 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:584 state:D stack:0 pid:4883 tgid:4883 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb491d84 r8:00000002 r7:60000113 r6:eb491d8c r5:85508c00 r4:85508c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85508c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb491e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85508c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eabad000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546d38c r4:8546d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546d38c r4:854a5880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85508c00 r8:854a58ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5880 r8:80287e08 r7:eb485e60 r6:854bf180 r5:85508c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb491fb0 to 0xeb491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555740 INFO: task kworker/0:584:4883 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c4764000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:585:4884 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:585 state:D stack:0 pid:4884 tgid:4884 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb495d84 r8:00000002 r7:60000113 r6:eb495d8c r5:85509800 r4:85509800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85509800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb495e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855559c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85509800 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eadfd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546d78c r4:8546d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546d78c r4:854a5900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85509800 r8:854a592c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5900 r8:80287e08 r7:eb485e60 r6:854bf200 r5:85509800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb495fb0 to 0xeb495ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555740 INFO: task kworker/0:585:4884 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c492a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:586:4886 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:586 state:D stack:0 pid:4886 tgid:4886 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb49dd84 r8:00000002 r7:60000113 r6:eb49dd8c r5:85508000 r4:85508000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85508000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb49de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555b00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85508000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546db8c r4:8546d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546db8c r4:854a5980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85508000 r8:854a59ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5980 r8:80287e08 r7:eb485e60 r6:854bf280 r5:85508000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb49dfb0 to 0xeb49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555a00 INFO: task kworker/0:586:4886 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c492a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:587:4888 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:587 state:D stack:0 pid:4888 tgid:4888 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a5d84 r8:00000002 r7:60000013 r6:eb4a5d8c r5:8550a400 r4:8550a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555c40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550a400 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546df8c r4:8546dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546df8c r4:854a5a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550a400 r8:854a5a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5a00 r8:80287e08 r7:eb485e60 r6:854bf300 r5:8550a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a5fb0 to 0xeb4a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555b40 INFO: task kworker/0:587:4888 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c4db7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:588:4890 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:588 state:D stack:0 pid:4890 tgid:4890 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4add84 r8:00000002 r7:60000113 r6:eb4add8c r5:8550b000 r4:8550b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550b000 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae6d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546e38c r4:8546e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546e38c r4:854a5a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550b000 r8:854a5aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5a80 r8:80287e08 r7:eb485e60 r6:854bf380 r5:8550b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4adfb0 to 0xeb4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555c80 INFO: task kworker/0:588:4890 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c5023000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:589:4892 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:589 state:D stack:0 pid:4892 tgid:4892 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b1d84 r8:00000002 r7:60000113 r6:eb4b1d8c r5:8550c800 r4:8550c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ae7c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae9d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546e78c r4:8546e400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546e78c r4:854a5b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550c800 r8:854a5b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5b00 r8:80287e08 r7:eb485e60 r6:854bf400 r5:8550c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b1fb0 to 0xeb4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555dc0 INFO: task kworker/0:589:4892 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c5179000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:590:4894 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:590 state:D stack:0 pid:4894 tgid:4894 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4a9d84 r8:00000002 r7:60000013 r6:eb4a9d8c r5:8550d400 r4:8550d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483ae40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550d400 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf57000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546eb8c r4:8546e800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546eb8c r4:854a5b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550d400 r8:854a5bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5b80 r8:80287e08 r7:eb485e60 r6:854bf480 r5:8550d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4a9fb0 to 0xeb4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854aee80 INFO: task kworker/0:590:4894 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c5179000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:591:4898 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:591 state:D stack:0 pid:4898 tgid:4898 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb421d84 r8:00000002 r7:60000013 r6:eb421d8c r5:8550e000 r4:8550e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb421e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546ef8c r4:8546ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546ef8c r4:854a5c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550e000 r8:854a5c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5c00 r8:80287e08 r7:eb485e60 r6:854bf500 r5:8550e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb421fb0 to 0xeb421ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c080 INFO: task kworker/0:591:4898 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c5381000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:592:4901 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:592 state:D stack:0 pid:4901 tgid:4901 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b9d84 r8:00000002 r7:60000013 r6:eb4b9d8c r5:8550bc00 r4:8550bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb009000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546f78c r4:8546f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546f78c r4:854a5c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550bc00 r8:854a5cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5c80 r8:80287e08 r7:eb485e60 r6:854bf580 r5:8550bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b9fb0 to 0xeb4b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c1c0 INFO: task kworker/0:592:4901 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c564f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:593:4902 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:593 state:D stack:0 pid:4902 tgid:4902 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4bdd84 r8:00000002 r7:60000113 r6:eb4bdd8c r5:8541e000 r4:8541e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8541e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8541e000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb021000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546fb8c r4:8546f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546fb8c r4:854a5d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8541e000 r8:854a5d2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5d00 r8:80287e08 r7:eb4b9e60 r6:854bf600 r5:8541e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4bdfb0 to 0xeb4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c340 INFO: task kworker/0:593:4902 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c57d7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:594:4905 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:594 state:D stack:0 pid:4905 tgid:4905 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c9d84 r8:00000002 r7:60000113 r6:eb4c9d8c r5:85560000 r4:85560000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85560000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85560000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb077000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547078c r4:85470400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547078c r4:854a5d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85560000 r8:854a5dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5d80 r8:80287e08 r7:eb4bde60 r6:854bf680 r5:85560000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c9fb0 to 0xeb4c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c4c0 INFO: task kworker/0:594:4905 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c57d7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:595:4907 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:595 state:D stack:0 pid:4907 tgid:4907 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d1d84 r8:00000002 r7:60000113 r6:eb4d1d8c r5:85561800 r4:85561800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85561800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85561800 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb043000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8546ff8c r4:8546fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8546ff8c r4:854a5e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85561800 r8:854a5e2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5e00 r8:80287e08 r7:eb4c9e60 r6:854bf700 r5:85561800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d1fb0 to 0xeb4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c4c0 INFO: task kworker/0:595:4907 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c5c65000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:596:4908 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:596 state:D stack:0 pid:4908 tgid:4908 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4d5d84 r8:00000002 r7:60000113 r6:eb4d5d8c r5:85562400 r4:85562400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85562400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85562400 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb065000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547038c r4:85470000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547038c r4:854a5e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85562400 r8:854a5eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5e80 r8:80287e08 r7:eb4c9e60 r6:854bf780 r5:85562400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4d5fb0 to 0xeb4d5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c800 INFO: task kworker/0:596:4908 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c5eb4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:294:4910 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:294 state:D stack:0 pid:4910 tgid:4910 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4ddd84 r8:00000002 r7:60000113 r6:eb4ddd8c r5:85563c00 r4:85563c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85563c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591b40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85563c00 r7:00000000 r6:83018200 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e05c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84471b8c r4:84471800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84471b8c r4:854bf800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85563c00 r8:854bf82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854bf800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bf800 r8:80287e08 r7:eb3e5e60 r6:854bf880 r5:85563c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4ddfb0 to 0xeb4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c0b00 INFO: task kworker/1:294:4910 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c61ae000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:597:4912 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:597 state:D stack:0 pid:4912 tgid:4912 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e5d84 r8:00000002 r7:60000113 r6:eb4e5d8c r5:85560c00 r4:85560c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85560c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557cc40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85560c00 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547138c r4:85471000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547138c r4:854a5f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85560c00 r8:854a5f2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5f00 r8:80287e08 r7:eb4c9e60 r6:854bf900 r5:85560c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e5fb0 to 0xeb4e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557c540 INFO: task kworker/0:597:4912 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c61ae000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:598:4913 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:598 state:D stack:0 pid:4913 tgid:4913 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4e9d84 r8:00000002 r7:60000113 r6:eb4e9d8c r5:85563000 r4:85563000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85563000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557c540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85563000 r7:00000000 r6:83018000 r5:00001000 r4:7f091000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85470b8c r4:85470800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85470b8c r4:854a5f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85563000 r8:854a5fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854a5f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854a5f80 r8:80287e08 r7:eb4e5e60 r6:854bf980 r5:85563000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4e9fb0 to 0xeb4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557ca80 INFO: task kworker/0:598:4913 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c67e3000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:599:4915 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:599 state:D stack:0 pid:4915 tgid:4915 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb419d84 r8:00000002 r7:60000113 r6:eb419d8c r5:853ce000 r4:853ce000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ce000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb419e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557ca00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ce000 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb095000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85470f8c r4:85470c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85470f8c r4:854c6000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ce000 r8:854c602c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6000 r8:80287e08 r7:eb4e5e60 r6:854c6080 r5:853ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb419fb0 to 0xeb419ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557cbc0 INFO: task kworker/0:599:4915 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c6a52000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:600:4919 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:600 state:D stack:0 pid:4919 tgid:4919 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4b5d84 r8:00000002 r7:60000113 r6:eb4b5d8c r5:853cd400 r4:853cd400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4b5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8557cdc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f097000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0dd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547178c r4:85471400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547178c r4:854c6100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cd400 r8:854c612c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6100 r8:80287e08 r7:eb4e5e60 r6:854c6180 r5:853cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4b5fb0 to 0xeb4b5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557cf00 INFO: task kworker/0:600:4919 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c6a52000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:601:4920 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:601 state:D stack:0 pid:4920 tgid:4920 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f5d84 r8:00000002 r7:60000113 r6:eb4f5d8c r5:853cec00 r4:853cec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85555f80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853cec00 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb107000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85471b8c r4:85471800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85471b8c r4:854c6200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cec00 r8:854c622c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6200 r8:80287e08 r7:eb4b5e60 r6:854c6280 r5:853cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f5fb0 to 0xeb4f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8557cd80 INFO: task kworker/0:601:4920 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c6e0d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:602:4922 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:602 state:D stack:0 pid:4922 tgid:4922 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4edd84 r8:00000002 r7:60000113 r6:eb4edd8c r5:853cbc00 r4:853cbc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cbc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb111000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85471f8c r4:85471c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85471f8c r4:854c6300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cbc00 r8:854c632c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6300 r8:80287e08 r7:eb4f5e60 r6:854c6380 r5:853cbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4edfb0 to 0xeb4edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85555e80 INFO: task kworker/0:602:4922 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c704a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:603:4925 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:603 state:D stack:0 pid:4925 tgid:4925 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4f9d84 r8:00000002 r7:60000113 r6:eb4f9d8c r5:853c8000 r4:853c8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c8000 r7:00000000 r6:83018000 r5:00001000 r4:7f09d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb123000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547238c r4:85472000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547238c r4:854c6400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c8000 r8:854c642c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6400 r8:80287e08 r7:eb4ede60 r6:854c6480 r5:853c8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4f9fb0 to 0xeb4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d1280 INFO: task kworker/0:603:4925 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c7327000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:604:4926 blocked for more than 469 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:604 state:D stack:0 pid:4926 tgid:4926 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4fdd84 r8:00000002 r7:60000113 r6:eb4fdd8c r5:853cb000 r4:853cb000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cb000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4fde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853cb000 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb131000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547278c r4:85472400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547278c r4:854c6500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cb000 r8:854c652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6500 r8:80287e08 r7:eb4f9e60 r6:854c6580 r5:853cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4fdfb0 to 0xeb4fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d1280 INFO: task kworker/0:604:4926 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c7567000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:605:4928 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:605 state:D stack:0 pid:4928 tgid:4928 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb501d84 r8:00000002 r7:60000113 r6:eb501d8c r5:853c9800 r4:853c9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853c9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb501e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853c9800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb169000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85472f8c r4:85472c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85472f8c r4:854c6600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853c9800 r8:854c662c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6600 r8:80287e08 r7:eb4fde60 r6:854c6680 r5:853c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb501fb0 to 0xeb501ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d1300 INFO: task kworker/0:605:4928 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c7746000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:606:4929 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:606 state:D stack:0 pid:4929 tgid:4929 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb509d84 r8:00000002 r7:60000013 r6:eb509d8c r5:85566c00 r4:85566c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85566c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb509e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85566c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb14b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85472b8c r4:85472800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85472b8c r4:854c6700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85566c00 r8:854c672c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6700 r8:80287e08 r7:eb501e60 r6:854bfa00 r5:85566c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb509fb0 to 0xeb509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d1300 INFO: task kworker/0:606:4929 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c7746000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:607:4932 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:607 state:D stack:0 pid:4932 tgid:4932 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb505d84 r8:00000002 r7:60000113 r6:eb505d8c r5:853ca400 r4:853ca400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853ca400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb505e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa1d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547378c r4:85473400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547378c r4:854c6780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853ca400 r8:854c67ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6780 r8:80287e08 r7:eb501e60 r6:854c6800 r5:853ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb505fb0 to 0xeb505ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d15c0 INFO: task kworker/0:607:4932 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c782a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:608:4934 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:608 state:D stack:0 pid:4934 tgid:4934 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb50dd84 r8:00000002 r7:60000113 r6:eb50dd8c r5:853cc800 r4:853cc800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853cc800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb50de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d16c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1c3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547338c r4:85473000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547338c r4:854c6880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853cc800 r8:854c68ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6880 r8:80287e08 r7:eb505e60 r6:854c6900 r5:853cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb50dfb0 to 0xeb50dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d15c0 INFO: task kworker/0:608:4934 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c7948000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:609:4936 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:609 state:D stack:0 pid:4936 tgid:4936 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb511d84 r8:00000002 r7:60000013 r6:eb511d8c r5:8487e000 r4:8487e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8487e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb511e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1b00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8487e000 r7:00000000 r6:83018000 r5:00001000 r4:7f04f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfc8f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85473b8c r4:85473800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85473b8c r4:854c6980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8487e000 r8:854c69ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6980 r8:80287e08 r7:eb505e60 r6:854c6a00 r5:8487e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb511fb0 to 0xeb511ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d1a40 INFO: task kworker/0:609:4936 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c7b51000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:610:4937 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:610 state:D stack:0 pid:4937 tgid:4937 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb515d84 r8:00000002 r7:60000113 r6:eb515d8c r5:84960000 r4:84960000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84960000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb515e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8483af40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84960000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa5d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547cb8c r4:8547c800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547cb8c r4:854c6a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84960000 r8:854c6aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6a80 r8:80287e08 r7:eb511e60 r6:854c6b00 r5:84960000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb515fb0 to 0xeb515ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d1a40 INFO: task kworker/0:610:4937 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb25de08 r5:00001000 r4:dff3d000 r5:85473f8c r4:85473c00 r10:61c88647 r9:84960c00 r8:854c6bac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0431d28 to 0xe0431d70) r4:e0431dc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:612:4942 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:612 state:D stack:0 pid:4942 tgid:4942 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb2a9d84 r8:00000002 r7:60000013 r6:eb2a9d8c r5:84961800 r4:84961800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84961800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb2a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1d40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84961800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e88d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547c38c r4:8547c000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547c38c r4:854c6c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84961800 r8:854c6cac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6c80 r8:80287e08 r7:eb515e60 r6:854c6d00 r5:84961800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2a9fb0 to 0xeb2a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854d1cc0 INFO: task kworker/0:612:4942 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c8028000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 r4:82ac21e4 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:613:4944 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:613 state:D stack:0 pid:4944 tgid:4944 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb265d84 r8:00000002 r7:60000013 r6:eb265d8c r5:84962400 r4:84962400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84962400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb265e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854d1ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84962400 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea94b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547c78c r4:8547c400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547c78c r4:854c6d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:854c6d80 5fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) r4:82ac21e4 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:84963000 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:00001000 r4:e0439000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:84963c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547d38c r4:8547d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547d38c r4:854c6f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84963c00 r8:854c6fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854c6f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854c6f80 r8:80287e08 r7:eb2b9e60 r6:854ed000 r5:84963c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb2b1fb0 to 0xeb2b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e8280 INFO: task kworker/0:615:4948 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c8971000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:616:4950 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:616 state:D stack:0 pid:4950 tgid:4950 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb51dd84 r8:00000002 r7:60000113 r6:eb51dd8c r5:84964800 r4:84964800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84964800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb51de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e8340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84964800 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac83000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8547d78c r4:8547d400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854ed080 r8:80287e08 r7:eb2b1e60 r6:854ed100 r5:84964800 r4:854e8100 INFO: task kworker/0:616:4950 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c8971000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8547df8c r4:8547dc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547df8c r4:854ed180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84965400 r8:854ed1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ed180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ed180 r8:80287e08 r7:eb51de60 r6:854ed200 r5:84965400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb521fb0 to 0xeb521ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e8100 INFO: task kworker/0:617:4953 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c8971000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:618 state:D stack:0 pid:4954 tgid:4954 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb519d84 r8:00000002 r7:60000013 r6:eb519d8c r5:84966000 r4:84966000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84966000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb519e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e8400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84966000 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacb7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547db8c r4:8547d800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547db8c r4:854ed280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84966000 r8:854ed2ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ed280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ed280 r8:80287e08 r7:eb521e60 r6:854ed300 r5:84966000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb519fb0 to 0xeb519ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e8100 INFO: task kworker/0:618:4954 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c8efd000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:619:4956 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:619 state:D stack:0 pid:4956 tgid:4956 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb529d84 r8:00000002 r7:60000013 r6:eb529d8c r5:84966c00 r4:84966c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84966c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb529e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e8800 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8547e38c r4:8547e000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854ed380 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e0431dc0 r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b4ef8c r4:84b4ec00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb52de08 r9:83018005 r8:853d8000 r7:00000000 r6:83018000 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547f78c r4:8547f400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547f78c r4:854ed480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d8000 r8:854ed4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ed480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ed480 r8:80287e08 r7:eb529e60 r6:854ed580 r5:853d8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb52dfb0 to 0xeb52dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e8740 INFO: task kworker/0:620:4959 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c91fa000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r5:8547e78c r4:8547e400 r7:dddced80 r6:83018000 r5:8547e78c r4:854ed600 r4:00000001 r4:854e8880 INFO: task kworker/0:621:4960 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c92f7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb525d84 r8:00000002 r7:60000113 r6:eb525d8c r5:853d9800 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8547f38c r4:8547f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547f38c r4:854ed700 r10:61c88647 r9:853d9800 r8:854ed72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854e8880 Call trace: 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:295:4965 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:295 state:D stack:0 pid:4965 tgid:4965 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb535d84 r8:00000002 r7:60000013 r6:eb535d8c r5:853da400 r4:853da400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853da400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb535e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591a40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:853da400 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0045000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8532ff8c r4:8532fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8532ff8c r4:854bfa80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853da400 r8:854bfaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854bfa80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bfa80 r8:80287e08 r7:eb4dde60 r6:854ed800 r5:853da400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb535fb0 to 0xeb535ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854dbfc0 INFO: task kworker/1:295:4965 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c986f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:00001000 r4:e0439000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafa9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8547fb8c r4:8547f800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8547fb8c r4:854ed880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853db000 r8:854ed8ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ed880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854ed880 r8:80287e08 r7:eb52de60 r6:854ed900 r5:853db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb539fb0 to 0xeb539ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c0ac0 INFO: task kworker/0:623:4967 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c9b40000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Exception stack(0xe0431fb0 to 0xe0431ff8) task:kworker/0:624 state:D stack:0 pid:4969 tgid:4969 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853dbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f073000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548838c r4:85488000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548838c r4:854eda00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853dbc00 r8:854eda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:854eda00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854eda00 r8:80287e08 r7:eb539e60 r6:854eda80 r5:853dbc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb53dfb0 to 0xeb53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff040 INFO: task kworker/0:624:4969 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c9c76000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:625:4971 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:625 state:D stack:0 pid:4971 tgid:4971 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:853dc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb541e08 r5:00001000 r4:eaff9000 r5:8547ff8c r4:8547fc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854ed980 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:00001000 r4:e0439000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb1e3000 r5:8548878c r4:85488400 r10:61c88647 r9:853dd400 r8:854edbac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff180 INFO: task kworker/0:626:4974 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: c9f7c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:627:4975 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:627 state:D stack:0 pid:4975 tgid:4975 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb549d84 r8:00000002 r7:60000113 r6:eb549d8c r5:853de000 r4:853de000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853de000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb549e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85488b8c r4:85488800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff300 INFO: task kworker/0:627:4975 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ca054000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:853dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 r5:85488f8c r4:85488c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:853dec00 r8:854eddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:854ff500 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) r4:82ac21e4 r4:00000000 r5:00001000 r4:e0439000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8548938c r4:854ede80 r10:00000000 r9:854ede80 r8:80287e08 r7:eb54de60 r6:854edf00 r5:855a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb551fb0 to 0xeb551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854ff640 INFO: task kworker/0:629:4979 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ca39d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:630:4981 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:630 state:D stack:0 pid:4981 tgid:4981 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb555d84 r8:00000002 r7:60000113 r6:eb555d8c r5:855a8c00 r4:855a8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855a8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb555e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ff9c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855a8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:8548978c r4:85489400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8548a38c r4:8548a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:8558b000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ca791000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:632:4985 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:632 state:D stack:0 pid:4985 tgid:4985 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb55dd84 r8:00000002 r7:60000113 r6:eb55dd8c r5:855aa400 r4:855aa400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855aa400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb55de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ffb40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855aa400 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb247000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85489b8c r4:85489800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85489b8c r4:8558b100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855aa400 r8:8558b12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558b100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b100 r8:80287e08 r7:eb559e60 r6:8558b180 r5:855aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb55dfb0 to 0xeb55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb267000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:8558b200 r8:80287e08 r7:eb559e60 r6:8558b280 r5:855ab000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:634:4990 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:634 state:D stack:0 pid:4990 tgid:4990 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb561d84 r8:00000002 r7:60000113 r6:eb561d8c r5:855abc00 r4:855abc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855abc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb561e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e8bc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855abc00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: caa3b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:635:4991 blocked for more than 470 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:635 state:D stack:0 pid:4991 tgid:4991 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb56dd84 r8:00000002 r7:60000013 r6:eb56dd8c r5:855ac800 r4:855ac800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548af8c r4:8548ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548af8c r4:8558b400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ac800 r8:8558b42c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558b400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b400 r8:80287e08 r7:eb561e60 r6:8558b480 r5:855ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb56dfb0 to 0xeb56dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854fff80 INFO: task kworker/0:635:4991 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cacb0000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb571d84 r8:00000002 r7:60000013 r6:eb571d8c r5:855ad400 r4:855ad400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ad400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb571e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ad400 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb291000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548ab8c r4:8548a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548ab8c r4:8558b500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ad400 r8:8558b52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558b500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b500 r8:80287e08 r7:eb56de60 r6:8558b580 r5:855ad400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:637:4995 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:637 state:D stack:0 pid:4995 tgid:4995 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb575d84 r8:00000002 r7:60000113 r6:eb575d8c r5:855ae000 r4:855ae000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855ae000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb575e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855ae000 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2c9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548b38c r4:8548b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548b38c r4:8558b600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ae000 r8:8558b62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558b600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b600 r8:80287e08 r7:eb56de60 r6:8558b680 r5:855ae000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: caf20000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb579d84 r8:00000002 r7:60000013 r6:eb579d8c r5:855aec00 r4:00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597600 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855aec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548bb8c r4:8548b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548bb8c r4:8558b700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855aec00 r8:8558b72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558b700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558b700 r8:80287e08 r7:eb575e60 r6:8558b780 r5:855aec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb579fb0 to 0xeb579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855972c0 INFO: task kworker/0:638:4997 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cb08c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:639:5000 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:639 state:D stack:0 pid:5000 tgid:5000 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb57dd84 r8:00000002 r7:60000113 r6:eb57dd8c r5:84798000 r4:84798000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84798000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb57de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84798000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548b78c r4:8548b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548b78c r4:8558b800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84798000 r8:8558b82c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xeb57dfb0 to 0xeb57dff8) task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:640 state:D stack:0 pid:5001 tgid:5001 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb581d84 r8:00000002 r7:60000013 r6:eb581d8c r5:84798c00 r4:84798c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84798c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb581e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84798c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb30f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8548bf8c r4:8548bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8548bf8c r4:8558b900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:8558b900 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:84b0e0c0 task:kworker/0:641 state:D stack:0 pid:5003 tgid:5003 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:84799800 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549438c r4:85494000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84799800 r8:8558ba2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558ba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558ba00 r8:80287e08 r7:eb581e60 r6:8558ba80 r5:84799800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb585fb0 to 0xeb585ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855976c0 INFO: task kworker/0:641:5003 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cb39c000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:642:5005 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:642 state:D stack:0 pid:5005 tgid:5005 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb589d84 r8:00000002 r7:60000013 r6:eb589d8c r5:8479a400 r4:8479a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb589e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85597a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549478c r4:85494400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:8558bb00 r8:80287e08 r7:eb585e60 r6:8558bb80 r5:8479a400 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0431d28 to 0xe0431d70) 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:643:5007 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:643 state:D stack:0 pid:5007 tgid:5007 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb58dd84 r8:00000002 r7:60000113 r6:eb58dd8c r5:8479bc00 r4:8479bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb58de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8479bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f02f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaac5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85494f8c r4:85494c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85494f8c r4:8558bc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8479bc00 r8:8558bc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558bc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558bc00 r8:80287e08 r7:eb589e60 r6:8558bc80 r5:8479bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb58dfb0 to 0xeb58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855979c0 INFO: task kworker/0:643:5007 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cb82e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8479b000 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb46de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8479b000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea977000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85494b8c r4:85494800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85494b8c r4:8558bd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8479b000 r8:8558bd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558bd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558bd00 r8:80287e08 r7:eb58de60 r6:8558bd80 r5:8479b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb46dfb0 to 0xeb46dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85597d40 INFO: task kworker/0:644:5011 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549538c r4:85495000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549538c r4:8558be00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8479d400 r8:8558be2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8558be00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8558be00 r8:80287e08 r7:eb58de60 r6:8558be80 r5:8479d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb469fb0 to 0xeb469ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a3100 INFO: task kworker/0:645:5014 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cbc43000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:296:5015 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:296 state:D stack:0 pid:5015 tgid:5015 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb569d84 r8:00000002 r7:60000113 r6:eb569d8c r5:8479e000 r4:8479e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb569e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84470f8c r4:84470c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:84470f8c r4:854bfb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8479e000 r8:854bfb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854bfb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bfb00 r8:80287e08 r7:eb4dde60 r6:8558bf00 r5:8479e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb569fb0 to 0xeb569ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85591940 INFO: task kworker/1:296:5015 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cbe47000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:297:5016 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:297 state:D stack:0 pid:5016 tgid:5016 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb055d84 r8:00000002 r7:60000113 r6:eb055d8c r5:8479ec00 r4:8479ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb055e08 r4:00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447178c r4:84471400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447178c r4:854bfb80 r10:61c88647 r9:8479ec00 r8:854bfbac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 r4:00000000 r5:00001000 r4:e0439000 r5:84b4ef8c r4:84b4ec00 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fa0: 00000000 00000000 00000000 00000000 r4:84b0e0c0 task:kworker/0:646 state:D stack:0 pid:5019 tgid:5019 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb489d84 r8:00000002 r7:60000013 r6:eb489d8c r5:8479c800 r4:8479c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8479c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb489e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8479c800 r7:00000000 r6:83018000 r5:00001000 r4:7f033000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eab67000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549578c r4:85495400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549578c r4:855e0000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8479c800 r8:855e002c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0000 r8:80287e08 r7:eb469e60 r6:855e0080 r5:8479c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb489fb0 to 0xeb489ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a32c0 INFO: task kworker/0:646:5019 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cc58b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Not tainted 6.15.0-rc7-syzkaller #0 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3940 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85495f8c r4:85495c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:855e0100 r8:80287e08 r7:eb489e60 r6:855e0180 r5:84790000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a33c0 INFO: task kworker/0:647:5020 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cc943000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:648:5022 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:648 state:D stack:0 pid:5022 tgid:5022 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb591d84 r8:00000002 r7:60000113 r6:eb591d8c r5:84791800 r4:84791800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84791800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb591e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xeb591fb0 to 0xeb591ff8) task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:649:5024 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:649 state:D stack:0 pid:5024 tgid:5024 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb599d84 r8:00000002 r7:60000113 r6:eb599d8c r5:84790c00 r4:84790c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84790c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb599e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3cc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84790c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eae87000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549638c r4:85496000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549638c r4:855e0300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84790c00 r8:855e032c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0300 r8:80287e08 r7:eb48de60 r6:855e0380 r5:84790c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb599fb0 to 0xeb599ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a3700 INFO: task kworker/0:649:5024 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cc943000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:298:5026 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:298 state:D stack:0 pid:5026 tgid:5026 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb59dd84 r8:00000002 r7:60000113 r6:eb59dd8c r5:84792400 r4:84792400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84792400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb59de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85591cc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84792400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf21000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549678c r4:85496400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8549678c r4:854bfc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84792400 r8:854bfc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854bfc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bfc00 r8:80287e08 r7:eb569e60 r6:855e0400 r5:84792400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb59dfb0 to 0xeb59dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85591f00 INFO: task kworker/1:298:5026 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ccfd3000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb4c1d84 r8:00000002 r7:60000013 r6:eb4c1d8c r5:85564800 r4:85564800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85564800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb4c1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3fc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85564800 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb001000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549738c r4:85497000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549738c r4:855e0480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85564800 r8:855e04ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0480 r8:80287e08 r7:eb599e60 r6:854bfc80 r5:85564800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb4c1fb0 to 0xeb4c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a3c80 INFO: task kworker/0:650:5027 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cd1e4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:651:5029 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:651 state:D stack:0 pid:5029 tgid:5029 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a1d84 r8:00000002 r7:60000013 r6:eb5a1d8c r5:85566000 r4:85566000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85566000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855a3ec0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85566000 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf41000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85496b8c r4:85496800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85496b8c r4:855e0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85566000 r8:855e052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0500 r8:80287e08 r7:eb4c1e60 r6:854bfd00 r5:85566000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a1fb0 to 0xeb5a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a3a00 INFO: task kworker/0:651:5029 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cd4b8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:299:5032 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:299 state:D stack:0 pid:5032 tgid:5032 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a9d84 r8:00000002 r7:60000113 r6:eb5a9d8c r5:85565400 r4:85565400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85565400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e9580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85565400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447138c r4:84471000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447138c r4:854bfd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85565400 r8:854bfdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854bfd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854bfd80 r8:80287e08 r7:eb569e60 r6:854bfe00 r5:85565400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5a9fb0 to 0xeb5a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:82ac21e4 r4:e0431dc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:652:5034 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:652 state:D stack:0 pid:5034 tgid:5034 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b1d84 r8:00000002 r7:60000113 r6:eb5b1d8c r5:8550ec00 r4:8550ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8550ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855979c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8550ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eafd7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85496f8c r4:85496c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85496f8c r4:855e0580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8550ec00 r8:855e05ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0580 r8:80287e08 r7:eb4c1e60 r6:854bfe80 r5:8550ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b1fb0 to 0xeb5b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85597e00 INFO: task kworker/0:652:5034 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cd8e6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:653:5036 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:653 state:D stack:0 pid:5036 tgid:5036 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5b9d84 r8:00000002 r7:60000013 r6:eb5b9d8c r5:853e0c00 r4:853e0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb083000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85497f8c r4:85497c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85497f8c r4:855e0600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0c00 r8:855e062c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0600 r8:80287e08 r7:eb4c1e60 r6:854bff00 r5:853e0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5b9fb0 to 0xeb5b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855a3a80 INFO: task kworker/0:653:5036 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cdad7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:654:5037 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:654 state:D stack:0 pid:5037 tgid:5037 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5bdd84 r8:00000002 r7:60000113 r6:eb5bdd8c r5:853e1800 r4:853e1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e1800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb031000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8549778c r4:85497400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8549778c r4:855e0680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e1800 r8:855e06ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0680 r8:80287e08 r7:eb5b9e60 r6:854bff80 r5:853e1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5bdfb0 to 0xeb5bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e2080 INFO: task kworker/0:654:5037 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cdad7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:655:5039 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:655 state:D stack:0 pid:5039 tgid:5039 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5c5d84 r8:00000002 r7:60000113 r6:eb5c5d8c r5:853e3000 r4:853e3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5c5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e21c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e3000 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb059000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85497b8c r4:85497800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85497b8c r4:855e0700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3000 r8:855e072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0700 r8:80287e08 r7:eb5b9e60 r6:855ec000 r5:853e3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5c5fb0 to 0xeb5c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e2080 INFO: task kworker/0:655:5039 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ce03f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:656:5042 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:656 state:D stack:0 pid:5042 tgid:5042 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5cdd84 r8:00000002 r7:60000113 r6:eb5cdd8c r5:853e3c00 r4:853e3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2c00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e3c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85625b8c r4:85625800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85625b8c r4:855e0780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e3c00 r8:855e07ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0780 r8:80287e08 r7:eb5b9e60 r6:855ec080 r5:853e3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5cdfb0 to 0xeb5cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e2280 INFO: task kworker/0:656:5042 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ce03f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:657:5043 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:657 state:D stack:0 pid:5043 tgid:5043 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d1d84 r8:00000002 r7:60000113 r6:eb5d1d8c r5:853e4800 r4:853e4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e25c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e4800 r7:00000000 r6:83018000 r5:00001000 r4:7f04b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb093000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562438c r4:85624000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562438c r4:855e0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e4800 r8:855e082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0800 r8:80287e08 r7:eb5cde60 r6:855ec100 r5:853e4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d1fb0 to 0xeb5d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e2280 INFO: task kworker/0:657:5043 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ce42f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:658:5045 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:658 state:D stack:0 pid:5045 tgid:5045 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5d9d84 r8:00000002 r7:60000013 r6:eb5d9d8c r5:853e6000 r4:853e6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5d9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e6000 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0a9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562478c r4:85624400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562478c r4:855e0880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6000 r8:855e08ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0880 r8:80287e08 r7:eb5cde60 r6:855ec180 r5:853e6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5d9fb0 to 0xeb5d9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e26c0 INFO: task kworker/0:658:5045 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ce42f000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:659:5047 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:659 state:D stack:0 pid:5047 tgid:5047 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5e1d84 r8:00000002 r7:60000013 r6:eb5e1d8c r5:853e5400 r4:853e5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e5400 r7:00000000 r6:83018000 r5:00001000 r4:7f083000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85624b8c r4:85624800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85624b8c r4:855e0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e5400 r8:855e092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0900 r8:80287e08 r7:eb5cde60 r6:855ec200 r5:853e5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e1fb0 to 0xeb5e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e2500 INFO: task kworker/0:659:5047 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ce74a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:660:5049 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:660 state:D stack:0 pid:5049 tgid:5049 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5e9d84 r8:00000002 r7:60000013 r6:eb5e9d8c r5:853e6c00 r4:853e6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853e6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e27c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853e6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85624f8c r4:85624c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85624f8c r4:855e0980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e6c00 r8:855e09ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0980 r8:80287e08 r7:eb5cde60 r6:855ec280 r5:853e6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5e9fb0 to 0xeb5e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e2600 INFO: task kworker/0:660:5049 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ce7ff000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:661:5051 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:661 state:D stack:0 pid:5051 tgid:5051 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5f1d84 r8:00000002 r7:60000113 r6:eb5f1d8c r5:85505400 r4:85505400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85505400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e29c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85505400 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb12f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562538c r4:85625000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562538c r4:855e0a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85505400 r8:855e0a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0a00 r8:80287e08 r7:eb5cde60 r6:855ec300 r5:85505400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb5f1fb0 to 0xeb5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e2a80 INFO: task kworker/0:661:5051 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: ce7ff000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:662:5053 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r4:853e2400 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853e2400 r8:855e0aac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe0431d28 to 0xe0431d70) r5:80050013 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:00000000 r5:00001000 r4:e0439000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:663:5055 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:663 state:D stack:0 pid:5055 tgid:5055 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb601d84 r8:00000002 r7:60000013 r6:eb601d8c r5:853d0c00 r4:853d0c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d0c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb601e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb33d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85625f8c r4:85625c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85625f8c r4:855e0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d0c00 r8:855e0b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0b00 r8:80287e08 r7:eb5cde60 r6:855ec400 r5:853d0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb601fb0 to 0xeb601ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e2900 INFO: task kworker/0:663:5055 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cee15000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:e0431dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8562678c r4:85626400 r10:61c88647 r9:853d2400 r8:855e0bac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:855e0b80 r8:80287e08 r7:eb601e60 r6:855ec480 r5:853d2400 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cef09000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:665:5060 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:665 state:D stack:0 pid:5060 tgid:5060 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb60dd84 r8:00000002 r7:60000013 r6:eb60dd8c r5:853d3000 r4:853d3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb60de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e2e80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d3000 r7:00000000 r6:83018000 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:853d3000 r8:855e0c2c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) r4:82ac21e4 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:666:5062 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:666 state:D stack:0 pid:5062 tgid:5062 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb611d84 r8:00000002 r7:60000113 r6:eb611d8c r5:853d3c00 r4:853d3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb611e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000001 INFO: task kworker/0:667:5064 blocked for more than 471 seconds. r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562738c r4:85627000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562738c r4:855e0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d6c00 r8:855e0dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855e0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855e0d80 r8:80287e08 r7:eb61de60 r6:855ec680 r5:853d6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb625fb0 to 0xeb625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f6280 INFO: task kworker/0:668:5066 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: cf744000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:669:5068 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:669 state:D stack:0 pid:5068 tgid:5068 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb629d84 r8:00000002 r7:60000113 r6:eb629d8c r5:853d4800 r4:853d4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb629e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f6700 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe0431d28 to 0xe0431d70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r5:00001000 r4:e0439000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:8562778c r4:855e0e80 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:300:5073 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:300 state:D stack:0 pid:5073 tgid:5073 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5fdd84 r8:00000002 r7:60000113 r6:eb5fdd8c r5:84796000 r4:84796000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84796000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856662c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84796000 r8:855ec7ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:671:5074 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:671 state:D stack:0 pid:5074 tgid:5074 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb5a5d84 r8:00000002 r7:60000013 r6:eb5a5d8c r5:84794800 r4:84794800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84794800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb5a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f6640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xeb5a5fb0 to 0xeb5a5ff8) Call trace: [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:672:5076 blocked for more than 471 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:672 state:D stack:0 pid:5076 tgid:5076 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb631d84 r8:00000002 r7:60000113 r6:eb631d8c r5:84793000 r4:84793000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84793000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb631e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f6d00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84793000 r7:00000000 r6:83018000 r5:00001000 r4:7f0a5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85628b8c r4:85628800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85628b8c r4:855fd100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84793000 r8:855fd12c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fd100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd100 r8:80287e08 r7:eb629e60 r6:855fd180 r5:84793000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb631fb0 to 0xeb631ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f6740 INFO: task kworker/0:672:5076 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 INFO: task kworker/0:673:5077 blocked for more than 471 seconds. Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb479000 r5:8562838c r4:85628000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84793c00 r8:855fd22c r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:674:5080 blocked for more than 471 seconds. r10:8291a684 r9:eb62dd84 r8:00000002 r7:60000013 r6:eb62dd8c r5:84795400 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:84795400 r8:855fd32c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855f6b80 INFO: task kworker/0:674:5080 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d016a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:675:5082 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85628f8c r4:85628c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855fd400 r8:80287e08 r7:eb631e60 r6:855fd480 r5:855c8000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb641d84 r8:00000002 r7:60000113 r6:eb641d8c r5:855c8c00 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8562938c r4:85629000 r4:855fd500 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f6ec0 INFO: task kworker/0:676:5084 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d0c61000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:677:5086 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:677 state:D stack:0 pid:5086 tgid:5086 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb64dd84 r8:00000002 r7:60000113 r6:eb64dd8c r5:855c9800 r4:855c9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855c9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a000 r5:8562978c r4:85629400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855c9800 r8:855fd62c r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) INFO: task kworker/0:678:5088 blocked for more than 472 seconds. r5:855cb000 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a240 r7:dddced80 r6:83018000 r5:85629b8c r4:855fd700 r10:61c88647 r9:855cb000 r8:855fd72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fd700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd700 r8:80287e08 r7:eb64de60 r6:855fd780 r5:855cb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb639fb0 to 0xeb639ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560a100 INFO: task kworker/0:678:5088 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d1571000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 task:kworker/0:679 state:D stack:0 pid:5090 tgid:5090 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a340 r5:85629f8c r4:85629c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:855cbc00 r8:855fd82c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:680:5093 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:680 state:D stack:0 pid:5093 tgid:5093 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb655d84 r8:00000002 r7:60000113 r6:eb655d8c r5:855cc800 r4:855cc800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:855cc800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb655e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855cc800 r7:00000000 r6:83018000 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea979000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562a78c r4:8562a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562a78c r4:855fd900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cc800 r8:855fd92c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fd900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fd900 r8:80287e08 r7:eb651e60 r6:855fd980 r5:855cc800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb655fb0 to 0xeb655ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560a2c0 INFO: task kworker/0:680:5093 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) Exception stack(0xe0431fb0 to 0xe0431ff8) Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:eb659d84 r8:00000002 r7:60000013 r6:eb659d8c r5:855cd400 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:855cd400 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e06e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562a38c r4:8562a000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562a38c r4:855fda00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cd400 r8:855fda2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fda00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fda00 r8:80287e08 r7:eb655e60 r6:855fda80 r5:855cd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb659fb0 to 0xeb659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560a400 INFO: task kworker/0:681:5094 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560a7c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562ab8c r4:8562a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562ab8c r4:855fdb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855cec00 r8:855fdb2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fdb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fdb00 r8:80287e08 r7:eb655e60 r6:855fdb80 r5:855cec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb661fb0 to 0xeb661ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560a580 INFO: task kworker/0:682:5097 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d2089000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018005 r8:855ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f059000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaca1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562b38c r4:8562b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562b38c r4:855fdc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:855ca400 r8:855fdc2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fdc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fdc00 r8:80287e08 r7:eb661e60 r6:855fdc80 r5:855ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb665fb0 to 0xeb665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560a580 INFO: task kworker/0:683:5098 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d25eb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:684:5099 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:684 state:D stack:0 pid:5099 tgid:5099 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb669d84 r8:00000002 r7:60000113 r6:eb669d8c r5:853d0000 r4:853d0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb669e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560aa80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d0000 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac35000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562af8c r4:8562ac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562af8c r4:855fdd00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d0000 r8:855fdd2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fdd00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fdd00 r8:80287e08 r7:eb665e60 r6:855ec800 r5:853d0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb669fb0 to 0xeb669ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560abc0 INFO: task kworker/0:684:5099 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d2e03000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:685:5102 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:685 state:D stack:0 pid:5102 tgid:5102 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb671d84 r8:00000002 r7:60000013 r6:eb671d8c r5:853d6000 r4:853d6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb671e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560acc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:853d6000 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaced000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562b78c r4:8562b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562b78c r4:855fdd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853d6000 r8:855fddac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fdd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fdd80 r8:80287e08 r7:eb665e60 r6:855ec880 r5:853d6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb671fb0 to 0xeb671ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560ab80 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) r10:8291a684 r9:eb679d84 r8:00000002 r7:60000113 r6:eb679d8c r5:85568000 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560ad80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85568000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead33000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8562bb8c r4:8562b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8562bb8c r4:855fde00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85568000 r8:855fde2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855fde00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fde00 r8:80287e08 r7:eb671e60 r6:855ec900 r5:85568000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb679fb0 to 0xeb679ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560ac40 INFO: task kworker/0:686:5104 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d3878000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:687:5106 blocked for more than 472 seconds. Workqueue: events bpf_prog_free_deferred r4:85569800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018005 r8:85569800 r7:00000000 r6:83018000 r5:00001000 r4:7f069000 r5:8563538c r4:85635000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85569800 r8:855fdeac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:688:5107 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:688 state:D stack:0 pid:5107 tgid:5107 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:8556a400 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 r7:dddced80 r6:83018000 r5:8562bf8c r4:855fdf00 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8563438c r4:85634000 r7:dddced80 r6:83018000 r5:8563438c r4:855fdf80 r4:00000001 r4:8561b0c0 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d430a000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:690:5111 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8563478c r4:85634400 Exception stack(0xeb695fb0 to 0xeb695ff8) 1d20: d44a3000 e0123000 00000001 80239b98 7f4df000 00000001 r4:00000000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb69dd84 r8:00000002 r7:60000113 r6:eb69dd8c r5:8556d400 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:85634b8c r4:85634800 r7:dddced80 r6:83018000 r5:85634b8c r4:8565c000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:692:5115 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:692 state:D stack:0 pid:5115 tgid:5115 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6a5d84 r8:00000002 r7:60000113 r6:eb6a5d8c r5:8556e000 r4:8556e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8556e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561b480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8556e000 r7:00000000 r6:83018000 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85634f8c r4:85634c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:82ac21e4 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r9:83018005 r8:8556bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06b000 r5:8563578c r4:85635400 r10:61c88647 r9:8556bc00 r8:8565c1ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565c180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565c180 r8:80287e08 r7:eb681e60 r6:855ecc80 r5:8556bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6adfb0 to 0xeb6adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8561b3c0 INFO: task kworker/0:693:5117 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d4ff8000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/0:694:5119 blocked for more than 472 seconds. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6b5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561b880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8556c800 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb249000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85635b8c r4:85635800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85635b8c r4:8565c200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r4:8561b500 1d60: 80230ad0 80239bb0 80050013 ffffffff r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:8556ec00 r4:8291a680 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85635f8c r4:85635c00 r7:dddced80 r6:83018000 r5:85635f8c r4:8565c280 r10:00000000 r9:8565c280 r8:80287e08 r7:eb6b5e60 r6:855ecd80 r5:8556ec00 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:696:5125 blocked for more than 472 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:696 state:D stack:0 pid:5125 tgid:5125 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6b9d84 r8:00000002 r7:60000013 r6:eb6b9d8c r5:853d1800 r4:853d1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:853d1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561ba80 r10:61c88647 r9:853d1800 r8:8565c32c r7:82804d40 r6:dddced80 r5:dddceda0 1d20: d57ce000 e0123000 00000001 80239b98 7f4df000 00000001 r4:00000001 Workqueue: events bpf_prog_free_deferred r5:85570000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8561bbc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85570000 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb2a1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8563678c r4:85636400 r10:61c88647 r9:85570000 r8:8565c3ac r7:82804d40 r6:dddced80 r5:dddceda0 1d20: d5c6b000 e0123000 00000001 80239b98 7f4df000 00000001 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r9:83018005 r8:85570c00 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d5c6b000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:61c88647 r9:85571800 r8:8565c4ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 r4:00000000 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:61c88647 r9:85572400 r8:8565c52c r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d60fe000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 r5:85637f8c r4:85637c00 r7:dddced80 r6:83018000 r5:85637f8c r4:8565c580 Workqueue: events bpf_prog_free_deferred r4:e0431dc0 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb6d1d84 r8:00000002 r7:60000113 r6:eb6d1d8c r5:85573c00 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85573c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb325000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563778c r4:85637400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563778c r4:8565c600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85573c00 r8:8565c62c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565c600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565c600 r8:80287e08 r7:eb6cde60 r6:85667100 r5:85573c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6d1fb0 to 0xeb6d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666340 INFO: task kworker/0:702:5136 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d660e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e0431dc0 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:703:5138 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:703 state:D stack:0 pid:5138 tgid:5138 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb6ddd84 r8:00000002 r7:60000113 r6:eb6ddd8c r5:85575400 r4:85575400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85575400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6dde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85575400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563838c r4:85638000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563838c r4:8565c680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85575400 r8:8565c6ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565c680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565c680 r8:80287e08 r7:eb6cde60 r6:85667180 r5:85575400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6ddfb0 to 0xeb6ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856661c0 INFO: task kworker/0:703:5138 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85576c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85576c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6ede08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666b00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85576c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb719000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563938c r4:85639000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563938c r4:8565c700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85576c00 r8:8565c72c r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565c700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565c700 r8:80287e08 r7:eb6dde60 r6:85667200 r5:85576c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6edfb0 to 0xeb6edff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666440 INFO: task kworker/0:704:5141 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 r5:84b4ef8c r4:84b4ec00 r4:84aeca80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85574800 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 r5:8563878c r4:85638400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85574800 r8:8565c7ac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:706:5145 blocked for more than 473 seconds. [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:85638b8c r4:8565c800 r10:00000000 r9:8565c800 r8:80287e08 r7:eb6ede60 r6:85667300 r5:85698c00 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666640 INFO: task kworker/0:706:5145 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d6ee6000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:707:5147 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:707 state:D stack:0 pid:5147 tgid:5147 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r5:84861800 r4:8291a680 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85638f8c r4:85638c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85638f8c r4:8565c880 r4:8565c880 1fa0: 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:82ac21e4 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:708:5150 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:708 state:D stack:0 pid:5150 tgid:5150 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb711d84 r8:00000002 r7:60000013 r6:eb711d8c r5:84862400 r4:84862400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84862400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb711e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666e00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84862400 r7:00000000 r6:83018000 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e00b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85639b8c r4:85639800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85639b8c r4:8565c980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84862400 r8:8565c9ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565c980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565c980 r8:80287e08 r7:eb6ede60 r6:8565ca00 r5:84862400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb711fb0 to 0xeb711ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666a40 INFO: task kworker/0:708:5150 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d72fb000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Not tainted 6.15.0-rc7-syzkaller #0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85666c00 r4:8565ca80 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) task:kworker/0:710 state:D stack:0 pid:5154 tgid:5154 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84863c00 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e07a3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85639f8c r4:85639c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85639f8c r4:8565cb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84863c00 r8:8565cbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565cb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565cb80 r8:80287e08 r7:eb711e60 r6:8565cc00 r5:84863c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb729fb0 to 0xeb729ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85666dc0 INFO: task kworker/0:710:5154 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d7814000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Exception stack(0xe0431fb0 to 0xe0431ff8) INFO: task kworker/0:711:5156 blocked for more than 473 seconds. r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb72de08 r5:00001000 r4:eaaf5000 r5:8563a38c r4:8563a000 r10:61c88647 r9:84864800 r8:8565ccac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r5:84b4ef8c r4:84b4ec00 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:712:5159 blocked for more than 473 seconds. Call trace: [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c000 r5:00001000 r4:eab65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563a78c r4:8563a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563a78c r4:8565cd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84865400 r8:8565cdac r7:82804d40 r6:dddced80 r5:dddceda0 r4:8565cd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8565cd80 r8:80287e08 r7:eb72de60 r6:8565ce00 r5:84865400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb731fb0 to 0xeb731ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567c0c0 INFO: task kworker/0:712:5159 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d7b45000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 r5:8563af8c r4:8563ac00 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567c240 INFO: task kworker/0:713:5160 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d7b45000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:714:5161 blocked for more than 473 seconds. [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r5:8563ab8c r4:8563a800 r10:00000000 r9:8565cf80 r8:80287e08 r7:eb735e60 r6:85680000 r5:84866c00 Exception stack(0xe0431d28 to 0xe0431d70) r4:00000000 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84860c00 r7:00000000 r6:83018000 r5:00001000 r4:7f035000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaead000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563b38c r4:8563b000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563b38c r4:85680080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84860c00 r8:856800ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680080 r8:80287e08 r7:eb735e60 r6:85680100 r5:84860c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb739fb0 to 0xeb739ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567c3c0 INFO: task kworker/0:715:5164 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d7fae000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:716:5167 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:853e0000 r7:00000000 r6:83018000 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563b78c r4:8563b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563b78c r4:85680180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:853e0000 r8:856801ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680180 r8:80287e08 r7:eb739e60 r6:85680200 r5:853e0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb745fb0 to 0xeb745ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567c5c0 INFO: task kworker/0:716:5167 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d8b8e000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Exception stack(0xe0431fb0 to 0xe0431ff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8291a684 r9:eb73dd84 r8:00000002 r7:60000113 r6:eb73dd8c r5:855ce000 r4:00000000 r4:00000000 r5:8563bb8c r4:8563b800 r10:61c88647 r9:855ce000 r8:856802ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:718:5170 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:718 state:D stack:0 pid:5170 tgid:5170 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb749d84 r8:00000002 r7:60000113 r6:eb749d8c r5:84930000 r4:84930000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84930000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb749e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567cb40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84930000 r7:00000000 r6:83018000 r5:00001000 r4:7f03d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb073000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8563bf8c r4:8563bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8563bf8c r4:85680380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84930000 r8:856803ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680380 r8:80287e08 r7:eb73de60 r6:85680400 r5:84930000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb749fb0 to 0xeb749ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567c780 INFO: task kworker/0:718:5170 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d8fe7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:719:5171 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:719 state:D stack:0 pid:5171 tgid:5171 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb74dd84 r8:00000002 r7:60000013 r6:eb74dd8c r5:84930c00 r4:84930c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84930c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb74de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567cc40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84930c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb08d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564038c r4:85640000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564038c r4:85680480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84930c00 r8:856804ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680480 r8:80287e08 r7:eb749e60 r6:85680500 r5:84930c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb74dfb0 to 0xeb74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567c780 INFO: task kworker/0:719:5171 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d8fe7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:720:5174 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:720 state:D stack:0 pid:5174 tgid:5174 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb741d84 r8:00000002 r7:60000013 r6:eb741d8c r5:84931800 r4:84931800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84931800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb741e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85686040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84931800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb19b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85640f8c r4:85640c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85640f8c r4:85680580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84931800 r8:856805ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680580 r8:80287e08 r7:eb74de60 r6:85680600 r5:84931800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb741fb0 to 0xeb741ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567cd80 INFO: task kworker/0:720:5174 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d92a2000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:721:5177 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:721 state:D stack:0 pid:5177 tgid:5177 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb75dd84 r8:00000002 r7:60000113 r6:eb75dd8c r5:8569b000 r4:8569b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb75de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567cdc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8569b000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb0db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564078c r4:85640400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564078c r4:85680680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569b000 r8:856806ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680680 r8:80287e08 r7:eb741e60 r6:85667380 r5:8569b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb75dfb0 to 0xeb75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567cf00 INFO: task kworker/0:721:5177 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:301:5179 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:301 state:D stack:0 pid:5179 tgid:5179 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb759d84 r8:00000002 r7:60000113 r6:eb759d8c r5:85698000 r4:85698000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85698000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb759e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:856d478c r4:856d4400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85667400 r8:80287e08 r7:eb569e60 r6:85667480 r5:85698000 task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe0431d28 to 0xe0431d70) 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:722:5181 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:722 state:D stack:0 pid:5181 tgid:5181 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb761d84 r8:00000002 r7:60000013 r6:eb761d8c r5:8569bc00 r4:8569bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb761e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567cf80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8569bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb137000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85640b8c r4:85640800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85640b8c r4:85680700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569bc00 r8:8568072c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680700 r8:80287e08 r7:eb741e60 r6:85667500 r5:8569bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb761fb0 to 0xeb761ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 INFO: task kworker/0:722:5181 is blocked on a mutex likely owned by task kworker/0:173:3630. 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:723:5183 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:723 state:D stack:0 pid:5183 tgid:5183 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb769d84 r8:00000002 r7:60000013 r6:eb769d8c r5:8569d400 r4:8569d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r4:00000000 r5:00001000 r4:eb3d9000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b0e0c0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:8569ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r4:85667600 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb771fb0 to 0xeb771ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856910c0 INFO: task kworker/1:302:5184 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: d9fd7000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:724:5186 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:724 state:D stack:0 pid:5186 tgid:5186 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb76dd84 r8:00000002 r7:60000013 r6:eb76dd8c r5:8569a400 r4:8569a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb76de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85686140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8569a400 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b4ef8c r4:84b4ec00 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:725 state:D stack:0 pid:5188 tgid:5188 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:303 state:D stack:0 pid:5189 tgid:5189 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:84935400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84935400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb779e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856915c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84935400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb477000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d4f8c r4:856d4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d4f8c r4:85667780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84935400 r8:856677ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667780 r8:80287e08 r7:eb759e60 r6:85680980 r5:84935400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb779fb0 to 0xeb779ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85691380 INFO: task kworker/1:303:5189 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: da520000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84aeca80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:eb77dd84 r8:00000002 r7:60000113 r6:eb77dd8c r5:84932400 r4:00000000 r10:61c88647 r9:84932400 r8:8566782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:726:5194 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:726 state:D stack:0 pid:5194 tgid:5194 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb781d84 r8:00000002 r7:60000013 r6:eb781d8c r5:84936c00 r4:84936c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84936c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb781e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856867c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84936c00 r7:00000000 r6:83018000 r5:00001000 r4:7f087000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb42d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85641f8c r4:85641c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85641f8c r4:85680a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84936c00 r8:85680aac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: 1d20: da955000 e0123000 00000001 80239b98 7f4df000 00000001 r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r7:dddced80 r6:83018000 r5:85642b8c r4:85680b80 r10:61c88647 r9:85710000 r8:85680bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680b80 r8:80287e08 r7:eb781e60 r6:85680c00 r5:85710000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb789fb0 to 0xeb789ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85686800 INFO: task kworker/0:727:5196 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: dab00000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb78de08 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:e0431dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) 1fa0: 00000000 00000000 00000000 00000000 r5:85712400 r4:8291a680 r4:00000000 r10:61c88647 r9:85712400 r8:856678ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:306:5200 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:306 state:D stack:0 pid:5200 tgid:5200 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb799d84 r8:00000002 r7:60000113 r6:eb799d8c r5:85713000 r4:85713000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85713000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb799e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856917c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85713000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb499000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d538c r4:856d5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d538c r4:85667900 r10:61c88647 r9:85713000 r8:8566792c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85714800 r4:8291a680 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856918c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85714800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d578c r4:856d5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d578c r4:85667980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85714800 r8:856679ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667980 r8:80287e08 r7:eb795e60 r6:85680e80 r5:85714800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a1fb0 to 0xeb7a1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85691700 INFO: task kworker/1:307:5202 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: db34d000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84aeca80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:85715400 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:85715400 r8:85667a2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 1fa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:85713c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85713c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567c5c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85713c00 r7:00000000 r6:83018000 r5:00001000 r4:7f093000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb593000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564278c r4:85642400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564278c r4:85680f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85713c00 r8:85680fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85680f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85680f80 r8:80287e08 r7:eb789e60 r6:85688000 r5:85713c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7a5fb0 to 0xeb7a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567cf00 INFO: task kworker/0:729:5208 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: dbc91000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:00000001 INFO: task kworker/0:730:5210 blocked for more than 473 seconds. r5:85716000 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:85642f8c r4:85642c00 r4:85688080 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1d20: dbe71000 e0123000 00000001 80239b98 7f4df000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84aeca80 1fa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:85716c00 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85716c00 r7:00000000 r6:83018000 r5:00001000 r4:7f09f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564338c r4:85643000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564338c r4:85688180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85716c00 r8:856881ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688180 r8:80287e08 r7:eb775e60 r6:85688200 r5:85716c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7adfb0 to 0xeb7adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85685100 INFO: task kworker/0:731:5212 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: dc157000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 Exception stack(0xe0431fb0 to 0xe0431ff8) "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84933000 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r7:dddced80 r6:83018000 r5:8565038c r4:85688280 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Call trace: 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:309:5216 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:309 state:D stack:0 pid:5216 tgid:5216 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7bdd84 r8:00000002 r7:60000113 r6:eb7bdd8c r5:84934800 r4:84934800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84934800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85691e80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84934800 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d638c r4:856d6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d638c r4:85667a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84934800 r8:85667aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667a80 r8:80287e08 r7:eb795e60 r6:85688380 r5:84934800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7bdfb0 to 0xeb7bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85691d80 INFO: task kworker/1:309:5216 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: dc869000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 r4:82ac21e4 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b0e0c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:84936000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:84936000 r7:00000000 r6:83018200 r5:00001000 r4:7f05b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84936000 r8:85667b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667b00 r8:80287e08 r7:eb7bde60 r6:85688400 r5:84936000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7c5fb0 to 0xeb7c5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85691e00 INFO: task kworker/1:310:5218 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: dc869000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:311:5219 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:311 state:D stack:0 pid:5219 tgid:5219 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7c9d84 r8:00000002 r7:60000113 r6:eb7c9d8c r5:85718000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:85718000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 r10:61c88647 r9:85718000 r8:85667bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:733:5222 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:733 state:D stack:0 pid:5222 tgid:5222 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7cdd84 r8:00000002 r7:60000013 r6:eb7cdd8c r5:8571a400 r4:8571a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85685980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8571a400 r7:00000000 r6:83018000 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb605000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8564378c r4:85643400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8564378c r4:85688500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571a400 r8:8568852c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688500 r8:80287e08 r7:eb7b5e60 r6:85688580 r5:8571a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7cdfb0 to 0xeb7cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85685a00 INFO: task kworker/0:733:5222 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: dd068000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:312 state:D stack:0 pid:5224 tgid:5224 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e1e08 r5:00001000 r4:eb7d7000 r10:61c88647 r9:8571b000 r8:85667c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:313:5226 blocked for more than 473 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:313 state:D stack:0 pid:5226 tgid:5226 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7e9d84 r8:00000002 r7:60000113 r6:eb7e9d8c r5:8571bc00 r4:8571bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 r5:85643b8c r4:85643800 r10:61c88647 r9:8571bc00 r8:85667cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe0431d28 to 0xe0431d70) r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b4ef8c r4:84b4ec00 r4:84aeca80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:314 state:D stack:0 pid:5227 tgid:5227 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d2c0 r10:61c88647 r9:8571c800 r8:85667d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:315:5231 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:315 state:D stack:0 pid:5231 tgid:5231 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7b1d84 r8:00000002 r7:60000013 r6:eb7b1d8c r5:8569c800 r4:8569c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8569c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d440 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8569c800 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfe61000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d738c r4:856d7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d738c r4:85667d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8569c800 r8:85667dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667d80 r8:80287e08 r7:eb7c5e60 r6:85667e00 r5:8569c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7b1fb0 to 0xeb7b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d280 INFO: task kworker/1:315:5231 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Call trace: 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:00000001 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:ea91f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Call trace: 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:317:5234 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:317 state:D stack:0 pid:5234 tgid:5234 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb751d84 r8:00000002 r7:60000113 r6:eb751d8c r5:84860000 r4:84860000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84860000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb751e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567d940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84860000 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacf9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d7b8c r4:856d7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d7b8c r4:85667f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84860000 r8:85667fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85667f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85667f80 r8:80287e08 r7:eb7c5e60 r6:85673000 r5:84860000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb751fb0 to 0xeb751ff8) 1fa0: 00000000 00000000 00000000 00000000 r4:8567d540 Call trace: 1d20: de3c4000 e0123000 00000001 80239b98 7f4df000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b4ef8c r4:84b4ec00 r4:84aeca80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eac99000 r10:61c88647 r9:8571d400 r8:856887ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/0:735:5239 blocked for more than 474 seconds. r4:85718c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb6f1e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567b700 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85718c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb891000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85650f8c r4:85650c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85650f8c r4:85688880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85718c00 r8:856888ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85688880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85688880 r8:80287e08 r7:eb6d5e60 r6:85688900 r5:85718c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb6f1fb0 to 0xeb6f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85685f00 INFO: task kworker/0:735:5239 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: de8f0000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b0e0c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85688980 r8:80287e08 r7:eb6f1e60 r6:85688a00 r5:8571e000 Call trace: 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:84aeca80 r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:318:5243 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:318 state:D stack:0 pid:5243 tgid:5243 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb80dd84 r8:00000002 r7:60000113 r6:eb80dd8c r5:8571ec00 r4:8571ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8571ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb80de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567dac0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8571ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eade7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8447278c r4:84472400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8447278c r4:85673080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8571ec00 r8:856730ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673080 r8:80287e08 r7:eb7c5e60 r6:85688a80 r5:8571ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb80dfb0 to 0xeb80dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567da80 INFO: task kworker/1:318:5243 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: dedd1000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:319:5244 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:319 state:D stack:0 pid:5244 tgid:5244 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb811d84 r8:00000002 r7:60000013 r6:eb811d8c r5:85711800 r4:85711800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85711800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb811e08 r4:00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fa0: 00000000 00000000 00000000 00000000 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: df2a4000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4d400 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0439000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 INFO: task kworker/1:320:5246 blocked for more than 474 seconds. r10:8291a684 r9:eb819d84 r8:00000002 r7:60000113 r6:eb819d8c r5:85720c00 r4:00000000 r9:83018205 r8:85720c00 r7:00000000 r6:83018200 r5:00001000 r4:7f05f000 r10:61c88647 r9:85720c00 r8:856731ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe0431d28 to 0xe0431d70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:321:5248 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:321 state:D stack:0 pid:5248 tgid:5248 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb821d84 r8:00000002 r7:60000113 r6:eb821d8c r5:85720000 r4:85720000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85720000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb821e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567ddc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85720000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb1d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d878c r4:856d8400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d878c r4:85673200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85720000 r8:8567322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673200 r8:80287e08 r7:eb811e60 r6:85688c00 r5:85720000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb821fb0 to 0xeb821ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567dd80 INFO: task kworker/1:321:5248 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: df601000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 1fa0: 00000000 00000000 00000000 00000000 task:kworker/1:322 state:D stack:0 pid:5250 tgid:5250 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567df40 r7:ddde2d80 r6:83018200 r5:856d8b8c r4:85673300 r4:00000001 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 1d60: 80230ad0 80239bb0 80050013 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r5:84b4ef8c r4:84b4ec00 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/1:323 state:D stack:0 pid:5252 tgid:5252 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:85722400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85722400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb831e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856600c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85722400 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb269000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d938c r4:856d9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d938c r4:85673280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85722400 r8:856732ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673280 r8:80287e08 r7:eb811e60 r6:85688d00 r5:85722400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb831fb0 to 0xeb831ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a28100 INFO: task kworker/1:323:5252 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4d400 r8:80200be4 r7:e0431d5c r6:ffffffff r5:84a4d400 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe0431d28 to 0xe0431d70) 1d20: df8bd000 e0123000 00000001 80239b98 7f4df000 00000001 1d40: 82ac15a0 7f4df000 e0123000 8280c928 82ac21c4 e0431da4 e0431da8 e0431d78 1d60: 80230ad0 80239bb0 80050013 ffffffff r5:80050013 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e0431dc0 r5:e0431e08 r4:e0431dc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e000 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4ef8c r4:84b4ec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aeca80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aeca80 r8:80287e08 r7:e0105e60 r6:84aecb00 r5:84a4d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe0431fb0 to 0xe0431ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e0c0 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:324:5254 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:324 state:D stack:0 pid:5254 tgid:5254 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb839d84 r8:00000002 r7:60000013 r6:eb839d8c r5:85724800 r4:85724800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb839e08 r5:00001000 r4:eb28f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856d978c r4:856d9400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856d978c r4:85673380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85724800 r8:856733ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673380 r8:80287e08 r7:eb831e60 r6:85688d80 r5:85724800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb839fb0 to 0xeb839ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85660040 INFO: task kworker/1:324:5254 is blocked on a mutex likely owned by task kworker/0:173:3630. task:kworker/0:173 state:R running task stack:0 pid:3630 tgid:3630 ppid:2 task_flags:0x4208060 flags:0x00000000 1d60: 80230ad0 80239bb0 80050013 ffffffff r4:e0431dc0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r10:61c88647 r9:84a4d400 r8:84aecaac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84b0e0c0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85723c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb841e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85660540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85723c00 r7:00000000 r6:83018200 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb323000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856da38c r4:856da000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856da38c r4:85673400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85723c00 r8:8567342c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673400 r8:80287e08 r7:eb839e60 r6:85688e00 r5:85723c00 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:81a55b5c [<81a55b64>] (mutex_unlock) from [<804e79e8>] (_vm_unmap_aliases+0x208/0x240 mm/vmalloc.c:2901) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84b4ef8c r4:84aeca80 r4:84aeca80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb705e08 r5:00001000 r4:eb2c7000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:85660040 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856d9f8c r4:856d9c00 r10:61c88647 r9:84a21800 r8:856735ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856602c0 INFO: task kworker/1:327:5261 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 7f99d000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:328:5263 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:328 state:D stack:0 pid:5263 tgid:5263 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb849d84 r8:00000002 r7:60000113 r6:eb849d8c r5:84a22400 r4:84a22400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a22400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb849e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856db38c r4:856db000 r7:ddde2d80 r6:83018200 r5:856db38c r4:85673680 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 900f0113 ffffffff r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred r5:84a23000 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:ddde2d80 r6:83018200 r5:856da78c r4:85673780 r10:61c88647 r9:84a23000 r8:856737ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673780 r8:80287e08 r7:eb849e60 r6:85673800 r5:84a23000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb805fb0 to 0xeb805ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85660580 INFO: task kworker/1:329:5264 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 7fc0e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 900f0113 ffffffff r5:900f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:330:5267 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:330 state:D stack:0 pid:5267 tgid:5267 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb851d84 r8:00000002 r7:60000113 r6:eb851d8c r5:84a23c00 r4:84a23c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a23c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856608c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a23c00 r7:00000000 r6:83018200 r5:00001000 r4:7f073000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb67d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856dab8c r4:856da800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856dab8c r4:85673880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a23c00 r8:856738ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673880 r8:80287e08 r7:eb849e60 r6:85673900 r5:84a23c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb851fb0 to 0xeb851ff8) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a24800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb859e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856daf8c r4:856dac00 r4:85673980 9fa0: 00000000 00000000 00000000 00000000 Call trace: dd20: 80103000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:332:5272 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:332 state:D stack:0 pid:5272 tgid:5272 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb855d84 r8:00000002 r7:60000013 r6:eb855d8c r5:84a26000 r4:84a26000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a26000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb855e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85660c80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a26000 r7:00000000 r6:83018200 r5:00001000 r4:7f079000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6d7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856db78c r4:856db400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856db78c r4:85673a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a26000 r8:85673aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673a80 r8:80287e08 r7:eb849e60 r6:85673b00 r5:84a26000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb855fb0 to 0xeb855ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85660b00 INFO: task kworker/1:332:5272 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 80518000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb861e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567dfc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a26c00 r7:00000000 r6:83018200 r5:00001000 r4:7f07b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856dbb8c r4:856db800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856dbb8c r4:85673b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a26c00 r8:85673bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85673b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85673b80 r8:80287e08 r7:eb855e60 r6:85673c00 r5:84a26c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb861fb0 to 0xeb861ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85660cc0 INFO: task kworker/1:333:5273 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:e043ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:334:5276 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:334 state:D stack:0 pid:5276 tgid:5276 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb869d84 r8:00000002 r7:60000113 r6:eb869d8c r5:85699800 r4:85699800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85699800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb869e08 r4:00000000 r5:856e038c r4:856e0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:856a0000 r7:00000000 r6:83018200 r5:00001000 r4:7f07f000 r5:856dbf8c r4:856dbc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85673d80 r8:80287e08 r7:eb869e60 r6:85673e00 r5:856a0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb86dfb0 to 0xeb86dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560f240 INFO: task kworker/1:335:5277 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 80eca000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:336:5280 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:336 state:D stack:0 pid:5280 tgid:5280 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb879d84 r8:00000002 r7:60000013 r6:eb879d8c r5:856a1800 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r9:83018205 r8:856a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r5:856e0b8c r4:856e0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:e043ddc0 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r4:856a0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb87de08 r5:00001000 r4:eb86f000 r5:856e078c r4:856e0400 r7:ddde2d80 r6:83018200 r5:856e078c r4:85673f80 r10:00000000 r9:85673f80 r8:80287e08 r7:eb879e60 r6:8561a000 r5:856a0c00 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:338:5283 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:338 state:D stack:0 pid:5283 tgid:5283 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb885d84 r8:00000002 r7:60000013 r6:eb885d8c r5:856a3c00 r4:856a3c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a3c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb885e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560fb00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856a3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb88b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e0f8c r4:856e0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e0f8c r4:8561a080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856a3c00 r8:8561a0ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561a080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561a080 r8:80287e08 r7:eb879e60 r6:8561a100 r5:856a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb885fb0 to 0xeb885ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560f840 INFO: task kworker/1:338:5283 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 811c6000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 r5:84b4f38c r4:84b4f000 r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb8a5000 r5:856e138c r4:856e1000 r10:61c88647 r9:856a4800 r8:8561a1ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560f840 INFO: task kworker/1:339:5285 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 81709000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:340:5286 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:340 state:D stack:0 pid:5286 tgid:5286 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb865d84 r8:00000002 r7:60000013 r6:eb865d8c r5:856a2400 r4:856a2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e1b8c r4:856e1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/0:737:5289 blocked for more than 474 seconds. r5:856a6000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567b580 r5:8565138c r4:85651000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85688e80 r10:00000000 r9:85688e80 r8:80287e08 r7:eb6f1e60 r6:8561a380 r5:856a6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8a9fb0 to 0xeb8a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567b640 INFO: task kworker/0:737:5289 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 81709000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:738:5291 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:738 state:D stack:0 pid:5291 tgid:5291 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856a3000 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85652f8c r4:85652c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85688f00 r8:80287e08 r7:eb8a9e60 r6:8561a400 r5:856a3000 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:739:5292 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:739 state:D stack:0 pid:5292 tgid:5292 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8b5d84 r8:00000002 r7:60000113 r6:eb8b5d8c r5:856a6c00 r4:856a6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856a6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8b5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8567b340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856a6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856e178c r4:856e1400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84b4f38c r4:84b4f000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:856a5400 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: dd20: 81d0d000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:e043ddc0 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:740:5296 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:740 state:D stack:0 pid:5296 tgid:5296 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8cdd84 r8:00000002 r7:60000113 r6:eb8cdd8c r5:84a20000 r4:84a20000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a20000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560fcc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a20000 r7:00000000 r6:83018000 r5:00001000 r4:7f0b9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565178c r4:85651400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565178c r4:85618000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a20000 r8:8561802c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85618000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85618000 r8:80287e08 r7:eb8b1e60 r6:8561a600 r5:84a20000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8cdfb0 to 0xeb8cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567bb00 INFO: task kworker/0:740:5296 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd20: 8204d000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe043dfb0 to 0xe043dff8) r4:84b0e300 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8d9e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) 9fa0: 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:342:5300 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:342 state:D stack:0 pid:5300 tgid:5300 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb8e9d84 r8:00000002 r7:60000013 r6:eb8e9d8c r5:856b2400 r4:856b2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85617780 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b2400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bd000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e1f8c r4:856e1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e1f8c r4:8561a700 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b2400 r8:8561a72c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561a700 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561a700 r8:80287e08 r7:eb8bde60 r6:8561a780 r5:856b2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8e9fb0 to 0xeb8e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856177c0 INFO: task kworker/1:342:5300 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 82652000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856b1800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85617280 r5:856e2b8c r4:856e2800 r7:ddde2d80 r6:83018200 r5:856e2b8c r4:8561a800 r10:61c88647 r9:856b1800 r8:8561a82c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561a800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561a800 r8:80287e08 r7:eb8bde60 r6:8561a880 r5:856b1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8f5fb0 to 0xeb8f5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85617500 INFO: task kworker/1:343:5302 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 82652000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 r4:856b3c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8fde08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:85651f8c r4:85651c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:856b4800 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 r5:8565238c r4:85652000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a280 INFO: task kworker/0:743:5306 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 82cce000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:744:5307 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:744 state:D stack:0 pid:5307 tgid:5307 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb85dd84 r8:00000002 r7:60000113 r6:eb85dd8c r5:85725400 r4:85725400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85725400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb85de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8565a300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85725400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb90d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565278c r4:85652400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565278c r4:85618200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85725400 r8:8561822c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85618200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85618200 r8:80287e08 r7:eb8b1e60 r6:85618280 r5:85725400 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85726000 r7:00000000 r6:83018000 r5:00001000 r4:7f02b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ea985000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e238c r4:856e2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856e238c r4:85618300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85726000 r8:8561832c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85618300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85618300 r8:80287e08 r7:eb8b1e60 r6:85618380 r5:85726000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb915fb0 to 0xeb915ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a4c0 INFO: task kworker/0:745:5313 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 831d0000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 Not tainted 6.15.0-rc7-syzkaller #0 r4:85726c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85726c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb895e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676440 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85726c00 r7:00000000 r6:83018000 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb11d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f038c r4:856f0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:856f038c r4:85618400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85726c00 r8:8561842c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85618400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85618400 r8:80287e08 r7:eb915e60 r6:85618480 r5:85726c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb895fb0 to 0xeb895ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8565a4c0 INFO: task kworker/0:746:5314 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 831d0000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:344:5317 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:344 state:D stack:0 pid:5317 tgid:5317 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb92dd84 r8:00000002 r7:60000013 r6:eb92dd8c r5:85719800 r4:85719800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85719800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb92de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85617d40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:344:5317 is blocked on a mutex likely owned by task kworker/0:174:3633. r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:848d8c00 r8:8561aaac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8353e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:346:5321 blocked for more than 474 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:346 state:D stack:0 pid:5321 tgid:5321 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb93dd84 r8:00000002 r7:60000013 r6:eb93dd8c r5:848da400 r4:848da400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848da400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb93de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848da400 r7:00000000 r6:83018200 r5:00001000 r4:7f03d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb167000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f078c r4:856f0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f078c r4:8561ab00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848da400 r8:8561ab2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561ab00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ab00 r8:80287e08 r7:eb935e60 r6:85618600 r5:848da400 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8353e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:856e378c r4:856e3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e378c r4:8561ac00 r10:00000000 r9:8561ac00 r8:80287e08 r7:eb93de60 r6:85618680 r5:848d8000 INFO: task kworker/1:347:5322 is blocked on a mutex likely owned by task kworker/0:174:3633. dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:8291a684 r9:eb949d84 r8:00000002 r7:60000013 r6:eb949d8c r5:848d9800 r4:00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848d9800 r7:00000000 r6:83018200 r5:00001000 r4:7f037000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb075000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856e3b8c r4:856e3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e3b8c r4:8561ab80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848d9800 r8:8561abac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561ab80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ab80 r8:80287e08 r7:eb93de60 r6:85618700 r5:848d9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb949fb0 to 0xeb949ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676240 INFO: task kworker/1:348:5324 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 83b85000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:856e3f8c r4:856e3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856e3f8c r4:8561ac80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848db000 r8:8561acac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561ac80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ac80 r8:80287e08 r7:eb93de60 r6:85618780 r5:848db000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb951fb0 to 0xeb951ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676140 INFO: task kworker/1:349:5326 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 83e84000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676a00 r5:856f178c r4:856f1400 r10:61c88647 r9:848dbc00 r8:8561ad2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 83e84000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:747:5330 blocked for more than 475 seconds. r4:848dc800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb95de08 r5:00001000 r4:e88eb000 r5:84954f8c r4:84954c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:848dc800 r8:856188ac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:351:5332 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:351 state:D stack:0 pid:5332 tgid:5332 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb965d84 r8:00000002 r7:60000113 r6:eb965d8c r5:848dd400 r4:848dd400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb965e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676640 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848dd400 r7:00000000 r6:83018200 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb35d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f0b8c r4:856f0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f0b8c r4:8561ad80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dd400 r8:8561adac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561ad80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ad80 r8:80287e08 r7:eb959e60 r6:85618980 r5:848dd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb965fb0 to 0xeb965ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r5:800f0113 r4:80239bb0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe043dfb0 to 0xe043dff8) Workqueue: events bpf_prog_free_deferred [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848de000 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb393000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f0f8c r4:856f0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f0f8c r4:8561ae00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848de000 r8:8561ae2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:8561ae00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:8561ae00 r8:80287e08 r7:eb959e60 r6:85618a00 r5:848de000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb96dfb0 to 0xeb96dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676680 INFO: task kworker/1:352:5334 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8451a000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:353:5336 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:353 state:D stack:0 pid:5336 tgid:5336 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:856b3000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:856f138c r4:856f1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856b3000 r8:8561aeac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:354:5338 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:354 state:D stack:0 pid:5338 tgid:5338 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:856b5400 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb971e08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856f278c r4:856f2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856b5400 r8:8561afac r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe043dd28 to 0xe043dd70) r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:355:5341 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:355 state:D stack:0 pid:5341 tgid:5341 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb975d84 r8:00000002 r7:60000113 r6:eb975d8c r5:856b6000 r4:856b6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb975e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676c40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b6000 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb459000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f1b8c r4:856f1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f1b8c r4:85619080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b6000 r8:856190ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619080 r8:80287e08 r7:eb971e60 r6:85619100 r5:856b6000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb975fb0 to 0xeb975ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85676c00 INFO: task kworker/1:355:5341 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 84b04000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred r5:856b6c00 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb97de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676d40 r5:856f1f8c r4:856f1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856b6c00 r8:856191ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r4:00000000 dd20: 84eba000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:357:5344 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:357 state:D stack:0 pid:5344 tgid:5344 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb929d84 r8:00000002 r7:60000113 r6:eb929d8c r5:856b0000 r4:856b0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb929e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85676f00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb4cd000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f238c r4:856f2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f238c r4:85619280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b0000 r8:856192ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619280 r8:80287e08 r7:eb971e60 r6:85619300 r5:856b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb929fb0 to 0xeb929ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856763c0 INFO: task kworker/1:357:5344 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 84eba000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:358:5347 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:358 state:D stack:0 pid:5347 tgid:5347 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb981d84 r8:00000002 r7:60000013 r6:eb981d8c r5:84a25400 r4:84a25400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84a25400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb981e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84a25400 r7:00000000 r6:83018200 r5:00001000 r4:7f083000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5b3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f2b8c r4:856f2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f2b8c r4:85619380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a25400 r8:856193ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619380 r8:80287e08 r7:eb971e60 r6:85619400 r5:84a25400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb981fb0 to 0xeb981ff8) 1fa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:358:5347 is blocked on a mutex likely owned by task kworker/0:174:3633. dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r4:00000000 r5:856f338c r4:856f3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:359:5349 is blocked on a mutex likely owned by task kworker/0:174:3633. dd20: 853c9000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:360:5351 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:360 state:D stack:0 pid:5351 tgid:5351 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb98dd84 r8:00000002 r7:60000113 r6:eb98dd8c r5:856b8000 r4:856b8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb98de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b8000 r7:00000000 r6:83018200 r5:00001000 r4:7f085000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5c7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f2f8c r4:856f2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f2f8c r4:85619580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b8000 r8:856195ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619580 r8:80287e08 r7:eb989e60 r6:85619600 r5:856b8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb98dfb0 to 0xeb98dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856004c0 INFO: task kworker/1:360:5351 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 856a8000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:361:5353 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:361 state:D stack:0 pid:5353 tgid:5353 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb991d84 r8:00000002 r7:60000013 r6:eb991d8c r5:856b8c00 r4:856b8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb991e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600500 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f089000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f378c r4:856f3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f378c r4:85619680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b8c00 r8:856196ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619680 r8:80287e08 r7:eb989e60 r6:85619700 r5:856b8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb991fb0 to 0xeb991ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600340 INFO: task kworker/1:361:5353 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 856a8000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:362:5355 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:362 state:D stack:0 pid:5355 tgid:5355 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb995d84 r8:00000002 r7:60000113 r6:eb995d8c r5:856b9800 r4:856b9800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856b9800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb995e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600b80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856b9800 r7:00000000 r6:83018200 r5:00001000 r4:7f091000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb791000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f478c r4:856f4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f478c r4:85619780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856b9800 r8:856197ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619780 r8:80287e08 r7:eb991e60 r6:85619800 r5:856b9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb995fb0 to 0xeb995ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856006c0 INFO: task kworker/1:362:5355 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8586c000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:363:5357 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:363 state:D stack:0 pid:5357 tgid:5357 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb999d84 r8:00000002 r7:60000013 r6:eb999d8c r5:856ba400 r4:856ba400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ba400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb999e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856005c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856ba400 r7:00000000 r6:83018200 r5:00001000 r4:7f08b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb61f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f3b8c r4:856f3800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f3b8c r4:85619880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ba400 r8:856198ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619880 r8:80287e08 r7:eb995e60 r6:85619900 r5:856ba400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb999fb0 to 0xeb999ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:856006c0 INFO: task kworker/1:363:5357 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 85bdc000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb99de08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856bb000 r7:00000000 r6:83018200 r5:00001000 r4:7f08d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb71d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f3f8c r4:856f3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f3f8c r4:85619980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bb000 r8:856199ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619980 r8:80287e08 r7:eb995e60 r6:85619a00 r5:856bb000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb99dfb0 to 0xeb99dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600800 INFO: task kworker/1:364:5359 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r5:856bbc00 r4:8291a680 r9:83018205 r8:856bbc00 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 r10:61c88647 r9:856bbc00 r8:85619aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600800 INFO: task kworker/1:365:5361 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 860e3000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:748:5363 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:748 state:D stack:0 pid:5363 tgid:5363 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r5:84830c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8565338c r4:85653000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565338c r4:85618a80 r4:85618a80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84831800 r7:00000000 r6:83018200 r5:00001000 r4:7f095000 r5:856f4f8c r4:856f4c00 r10:61c88647 r9:84831800 r8:85619bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:367:5366 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:367 state:D stack:0 pid:5366 tgid:5366 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9b9d84 r8:00000002 r7:60000113 r6:eb9b9d8c r5:84833000 r4:84833000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84833000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600c80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84833000 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f4b8c r4:856f4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f4b8c r4:85619c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84833000 r8:85619c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619c00 r8:80287e08 r7:eb9b5e60 r6:85618c00 r5:84833000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9b9fb0 to 0xeb9b9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600c00 INFO: task kworker/1:367:5366 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 865ff000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb9d9000 r5:856f5f8c r4:856f5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f5f8c r4:85619c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84830000 r8:85619cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619c80 r8:80287e08 r7:eb9b5e60 r6:85618c80 r5:84830000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c1fb0 to 0xeb9c1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85600c00 INFO: task kworker/1:368:5368 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 86a2c000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:369:5370 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:369 state:D stack:0 pid:5370 tgid:5370 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c9d84 r8:00000002 r7:60000013 r6:eb9c9d8c r5:84833c00 r4:84833c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84833c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85600f00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84833c00 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7d9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f538c r4:856f5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f538c r4:85619d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84833c00 r8:85619d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619d00 r8:80287e08 r7:eb9c1e60 r6:85618d00 r5:84833c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9c9fb0 to 0xeb9c9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e6080 INFO: task kworker/1:369:5370 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 Exception stack(0xe043dd28 to 0xe043dd70) dd60: 80230ad0 80239bb0 800f0113 ffffffff [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/1:370:5371 blocked for more than 475 seconds. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9cdd84 r8:00000002 r7:60000113 r6:eb9cdd8c r5:84834800 r4:84834800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84834800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9cde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e6040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84834800 r7:00000000 r6:83018200 r5:00001000 r4:7f099000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f578c r4:856f5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f578c r4:85619d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84834800 r8:85619dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619d80 r8:80287e08 r7:eb9c1e60 r6:85618d80 r5:84834800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9cdfb0 to 0xeb9cdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e6140 INFO: task kworker/1:370:5371 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 86a2c000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r5:00001000 r4:e0447000 r5:84b4f38c r4:84b4f000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe043dfb0 to 0xe043dff8) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e6280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84836000 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f5b8c r4:856f5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f5b8c r4:85619e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84836000 r8:85619e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619e00 r8:80287e08 r7:eb9c1e60 r6:85618e00 r5:84836000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9e1fb0 to 0xeb9e1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e6080 INFO: task kworker/1:371:5375 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 86d84000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:749:5377 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:749 state:D stack:0 pid:5377 tgid:5377 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f1d84 r8:00000002 r7:60000113 r6:eb9f1d8c r5:84832400 r4:84832400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84832400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559d600 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84832400 r7:00000000 r6:83018000 r5:00001000 r4:7f0c9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba3b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8565378c r4:85653400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8565378c r4:85618e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84832400 r8:85618eac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85618e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85618e80 r8:80287e08 r7:eb95de60 r6:85618f00 r5:84832400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f1fb0 to 0xeb9f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85602740 INFO: task kworker/0:749:5377 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 86d84000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:372:5378 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:372 state:D stack:0 pid:5378 tgid:5378 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9f5d84 r8:00000002 r7:60000113 r6:eb9f5d8c r5:84835400 r4:84835400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84835400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f638c r4:856f6000 r7:ddde2d80 r6:83018200 r5:856f638c r4:85619e80 r4:00000001 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8745a000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Call trace: r5:85723000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9fde08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e6980 r5:00001000 r4:eba27000 r5:856f738c r4:856f7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f738c r4:85619f00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85723000 r8:85619f2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619f00 r8:80287e08 r7:eb9f5e60 r6:855a0000 r5:85723000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9fdfb0 to 0xeb9fdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e6300 INFO: task kworker/1:373:5380 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 87583000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:374:5382 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:374 state:D stack:0 pid:5382 tgid:5382 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba09d84 r8:00000002 r7:60000013 r6:eba09d8c r5:85730000 r4:85730000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85730000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba09e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e6580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85730000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9ed000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:856f678c r4:856f6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:856f678c r4:85619f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85730000 r8:85619fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85619f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85619f80 r8:80287e08 r7:eb9fde60 r6:855a0080 r5:85730000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba09fb0 to 0xeba09ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e6740 INFO: task kworker/1:374:5382 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 87583000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:375:5383 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:375 state:D stack:0 pid:5383 tgid:5383 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85730c00 r4:8291a680 r4:00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:856f6b8c r4:856f6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855a7000 5fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:e043ddc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 task:kworker/1:376 state:D stack:0 pid:5385 tgid:5385 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba21e08 r5:00001000 r4:eba11000 r5:856f6f8c r4:856f6c00 r10:61c88647 r9:85732400 r8:855a70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:855a7080 r8:80287e08 r7:eb9fde60 r6:855a0180 r5:85732400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba21fb0 to 0xeba21ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e6780 INFO: task kworker/1:376:5385 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 878ba000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:377:5387 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:377 state:D stack:0 pid:5387 tgid:5387 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8291a684 r9:eba31d84 r8:00000002 r7:60000013 r6:eba31d8c r5:85731800 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:61c88647 r9:85731800 r8:855a712c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:378:5390 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:378 state:D stack:0 pid:5390 tgid:5390 ppid:2 task_flags:0x4208060 flags:0x00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8570038c r4:85700000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855e6ac0 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:e043ddc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85734800 r4:8291a680 r4:00000000 r5:856f7b8c r4:856f7800 r7:ddde2d80 r6:83018200 r5:856f7b8c r4:855a7200 5fa0: 00000000 00000000 00000000 00000000 Exception stack(0xe043dd28 to 0xe043dd70) r4:00000000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559dd80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85736000 r7:00000000 r6:83018000 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:dfa89000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85653f8c r4:85653c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85653f8c r4:855a0380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85736000 r8:855a03ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0380 r8:80287e08 r7:eb95de60 r6:855a0400 r5:85736000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba4dfb0 to 0xeba4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559d780 INFO: task kworker/0:750:5394 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 88799000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:380:5395 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:380 state:D stack:0 pid:5395 tgid:5395 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9c5d84 r8:00000002 r7:60000113 r6:eb9c5d8c r5:856be000 r4:856be000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9c5e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:856f7f8c r4:856f7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855a7280 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r4:e043ddc0 r5:00001000 r4:e0447000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: r4:856bec00 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:856bec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0d3000 r5:85700b8c r4:85700800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85700b8c r4:855a7380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bec00 r8:855a73ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855a7380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7380 r8:80287e08 r7:eba39e60 r6:855a7400 r5:856bec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba49fb0 to 0xeba49ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85602300 INFO: task kworker/1:381:5398 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 88799000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eba63000 r5:8570078c r4:85700400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856bc800 r8:855a74ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85602300 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r5:84b4f38c r4:84b4f000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:383:5402 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:383 state:D stack:0 pid:5402 tgid:5402 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba61d84 r8:00000002 r7:60000113 r6:eba61d8c r5:856bd400 r4:856bd400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856bd400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba61e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558f040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:856bd400 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85700f8c r4:85700c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85700f8c r4:855a7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856bd400 r8:855a75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855a7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a7580 r8:80287e08 r7:eba49e60 r6:855a7600 r5:856bd400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba61fb0 to 0xeba61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558f040 INFO: task kworker/1:383:5402 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 88ea6000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e043ddc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings task:kworker/0:751 state:D stack:0 pid:5407 tgid:5407 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb8ade08 r9:83018005 r8:856c1800 r7:00000000 r6:83018000 r5:00001000 r4:7f05b000 r5:85754b8c r4:85754800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855a0480 r8:80287e08 r7:eb95de60 r6:855a7680 r5:856c1800 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r5:84b4f38c r4:84b4f000 r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:856c0c00 r4:8291a680 r4:00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c0c00 r7:00000000 r6:83018000 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eac11000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8495438c r4:84954000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8495438c r4:855a0500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c0c00 r8:855a052c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0500 r8:80287e08 r7:eb8ade60 r6:855a7780 r5:856c0c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb8d1fb0 to 0xeb8d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559dec0 INFO: task kworker/0:752:5409 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8934f000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:eb8e5d84 r8:00000002 r7:60000113 r6:eb8e5d8c r5:856c3000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8570178c r4:85701400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: r5:856c3c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8570138c r4:85701000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:753:5413 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:753 state:D stack:0 pid:5413 tgid:5413 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba85d84 r8:00000002 r7:60000013 r6:eba85d8c r5:856c4800 r4:856c4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba85e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559d940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c4800 r7:00000000 r6:83018000 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacd5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8575438c r4:85754000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856c4800 r8:855a05ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0580 r8:80287e08 r7:eb8ade60 r6:855a7980 r5:856c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba85fb0 to 0xeba85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559df80 INFO: task kworker/0:753:5413 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 89a5b000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: r5:856c2400 r4:8291a680 r4:00000000 r4:00000000 r5:8575478c r4:85754400 r7:dddced80 r6:83018000 r5:8575478c r4:855a0600 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 89f10000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 INFO: task kworker/0:755:5416 blocked for more than 475 seconds. "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:755 state:D stack:0 pid:5416 tgid:5416 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba91d84 r8:00000002 r7:60000113 r6:eba91d8c r5:856c6000 r4:856c6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba91e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559b180 r9:83018005 r8:856c6000 r7:00000000 r6:83018000 r5:00001000 r4:7f05d000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 Call trace: [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Workqueue: events bpf_prog_free_deferred [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:757:5421 blocked for more than 475 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:757 state:D stack:0 pid:5421 tgid:5421 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaa5d84 r8:00000002 r7:60000013 r6:ebaa5d8c r5:856c8c00 r4:856c8c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c8c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaa5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559b280 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c8c00 r7:00000000 r6:83018000 r5:00001000 r4:7f05f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb22d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575538c r4:85755000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575538c r4:855a0780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c8c00 r8:855a07ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0780 r8:80287e08 r7:eba99e60 r6:855a7b80 r5:856c8c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa5fb0 to 0xebaa5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559b140 INFO: task kworker/0:757:5421 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8a2e7000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:856c9800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb27f000 r5:8575578c r4:85755400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575578c r4:855a0800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c9800 r8:855a082c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0800 r8:80287e08 r7:eba99e60 r6:855a7c00 r5:856c9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaa9fb0 to 0xebaa9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559b200 INFO: task kworker/0:758:5422 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0447000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8575678c r4:85756400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/0:760:5426 blocked for more than 475 seconds. task:kworker/0:760 state:D stack:0 pid:5426 tgid:5426 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebabdd84 r8:00000002 r7:60000113 r6:ebabdd8c r5:856ca400 r4:856ca400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856ca400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebabde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559b680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856ca400 r7:00000000 r6:83018000 r5:00001000 r4:7f065000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb309000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85755f8c r4:85755c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85755f8c r4:855a0900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856ca400 r8:855a092c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0900 r8:80287e08 r7:ebab1e60 r6:855a7d00 r5:856ca400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebabdfb0 to 0xebabdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559b500 INFO: task kworker/0:760:5426 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8ad4f000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:8575638c r4:85756000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855a0980 r8:80287e08 r7:ebab1e60 r6:855a7d80 r5:856c8000 r4:8559b6c0 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8b37b000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:762:5430 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:762 state:D stack:0 pid:5430 tgid:5430 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebacdd84 r8:00000002 r7:60000113 r6:ebacdd8c r5:856cbc00 r4:856cbc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856cbc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebacde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559bb40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856cbc00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6e1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:85756b8c r4:85756800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856cbc00 r8:855a0a2c r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:386:5433 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:386 state:D stack:0 pid:5433 tgid:5433 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb84dd84 r8:00000002 r7:60000113 r6:eb84dd8c r5:856cd400 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb8dd000 r5:85701f8c r4:85701c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:856cd400 r8:855a7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 task:kworker/1:387 state:D stack:0 pid:5435 tgid:5435 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:85701b8c r4:85701800 r7:ddde2d80 r6:83018200 r5:85701b8c r4:855a7f80 r10:00000000 r9:855a7f80 r8:80287e08 r7:eb84de60 r6:855f0000 r5:856ce000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba75fb0 to 0xeba75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558f740 INFO: task kworker/1:387:5435 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8bb64000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:763:5437 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:763 state:D stack:0 pid:5437 tgid:5437 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85756f8c r4:85756c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855a0a80 r8:80287e08 r7:ebacde60 r6:855f0080 r5:856cc800 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:764:5439 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:764 state:D stack:0 pid:5439 tgid:5439 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaddd84 r8:00000002 r7:60000013 r6:ebaddd8c r5:856c0000 r4:856c0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebadde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f2040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c0000 r7:00000000 r6:83018000 r5:00001000 r4:7f079000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb815000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85757f8c r4:85757c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85757f8c r4:855a0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c0000 r8:855a0b2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0b00 r8:80287e08 r7:ebad5e60 r6:855f0100 r5:856c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaddfb0 to 0xebaddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:00000000 r5:84b4f38c r4:84b4f000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Call trace: r5:856cec00 r4:8291a680 r4:00000000 r4:00000000 r5:8575738c r4:85757000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855a0b80 r8:80287e08 r7:ebadde60 r6:855f0180 r5:856cec00 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:766:5442 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:766 state:D stack:0 pid:5442 tgid:5442 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebae9d84 r8:00000002 r7:60000113 r6:ebae9d8c r5:85780c00 r4:85780c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85780c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85780c00 r7:00000000 r6:83018000 r5:00001000 r4:7f075000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7f1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575778c r4:85757400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575778c r4:855a0c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780c00 r8:855a0c2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0c00 r8:80287e08 r7:ebadde60 r6:855f0200 r5:85780c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebae9fb0 to 0xebae9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8559be80 INFO: task kworker/0:766:5442 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8c180000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Not tainted 6.15.0-rc7-syzkaller #0 r4:85782400 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8559d380 r5:85757b8c r4:85757800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855a0c80 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:85758b8c r4:855a0d00 r10:00000000 r9:855a0d00 r8:80287e08 r7:ebadde60 r6:855f0300 r5:85781800 r4:855f2000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8c4e4000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:769:5448 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:769 state:D stack:0 pid:5448 tgid:5448 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebac5d84 r8:00000002 r7:60000113 r6:ebac5d8c r5:85736c00 r4:85736c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85736c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebac5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f2180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85736c00 r7:00000000 r6:83018000 r5:00001000 r4:7f07b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb823000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575838c r4:85758000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575838c r4:855a0d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85736c00 r8:855a0dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0d80 r8:80287e08 r7:ebafde60 r6:855a0e00 r5:85736c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85733000 r7:00000000 r6:83018000 r5:00001000 r4:7f07d000 r5:8575878c r4:85758400 r10:61c88647 r9:85733000 r8:855a0eac r7:82804d40 r6:dddced80 r5:dddceda0 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred dd20: 8ca6e000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:e043ddc0 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:771:5454 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:771 state:D stack:0 pid:5454 tgid:5454 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb01d84 r8:00000002 r7:60000113 r6:ebb01d8c r5:85735400 r4:85735400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85735400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f2540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85735400 r7:00000000 r6:83018000 r5:00001000 r4:7f081000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb873000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85758f8c r4:85758c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85758f8c r4:855a0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85735400 r8:855a0fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855a0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855a0f80 r8:80287e08 r7:ebafde60 r6:85610000 r5:85735400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb01fb0 to 0xebb01ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f2580 INFO: task kworker/0:771:5454 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8d145000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebad1e08 r9:83018005 r8:84836c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a7000 r5:8575938c r4:85759000 r10:61c88647 r9:84836c00 r8:856100ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8d145000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:773:5457 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:773 state:D stack:0 pid:5457 tgid:5457 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb15d84 r8:00000002 r7:60000013 r6:ebb15d8c r5:848dec00 r4:848dec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848dec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb15e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f2940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:848dec00 r7:00000000 r6:83018000 r5:00001000 r4:7f0a9000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb89d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575978c r4:85759400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575978c r4:85610180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848dec00 r8:856101ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610180 r8:80287e08 r7:ebad1e60 r6:85610200 r5:848dec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb15fb0 to 0xebb15ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f26c0 INFO: task kworker/0:773:5457 is blocked on a mutex likely owned by task kworker/0:174:3633. [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:e043ddc0 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:774 state:D stack:0 pid:5460 tgid:5460 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb19d84 r8:00000002 r7:60000113 r6:ebb19d8c r5:84880000 r4:84880000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84880000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb19e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855f29c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84880000 r7:00000000 r6:83018000 r5:00001000 r4:7f0ab000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b7000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85759b8c r4:85759800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85759b8c r4:85610280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84880000 r8:856102ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610280 r8:80287e08 r7:ebb15e60 r6:85610300 r5:84880000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb19fb0 to 0xebb19ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f2900 INFO: task kworker/0:774:5460 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8d685000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe043dfb0 to 0xe043dff8) Not tainted 6.15.0-rc7-syzkaller #0 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575a38c r4:8575a000 r7:dddced80 r6:83018000 r5:8575a38c r4:85610380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84880c00 r8:856103ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610380 r8:80287e08 r7:ebb19e60 r6:85610400 r5:84880c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb1dfb0 to 0xebb1dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f2900 INFO: task kworker/0:775:5461 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8da82000 e0435000 00000001 80239b98 7f4e1000 00000001 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85759f8c r4:85759c00 r10:61c88647 r9:84882400 r8:856104ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 8df4c000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:388:5465 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:388 state:D stack:0 pid:5465 tgid:5465 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb31d84 r8:00000002 r7:60000113 r6:ebb31d8c r5:84883c00 r4:84883c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84883c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb31e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84883c00 r7:00000000 r6:83018200 r5:00001000 r4:7f031000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb09b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85703b8c r4:85703800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85703b8c r4:855f0380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84883c00 r8:855f03ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0380 r8:80287e08 r7:eb84de60 r6:85610580 r5:84883c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb31fb0 to 0xebb31ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f7ec0 INFO: task kworker/1:388:5465 is blocked on a mutex likely owned by task kworker/0:174:3633. [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:8570238c r4:85702000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570238c r4:855f0400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84881800 r8:855f042c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0400 r8:80287e08 r7:ebb31e60 r6:85610600 r5:84881800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb35fb0 to 0xebb35ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855f7ec0 INFO: task kworker/1:389:5466 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8e1d0000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 INFO: task kworker/0:777:5469 blocked for more than 476 seconds. r10:8291a684 r9:ebb39d84 r8:00000002 r7:60000113 r6:ebb39d8c r5:84885400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb39e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r7:dddced80 r6:83018000 r5:8575af8c r4:85610680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84885400 r8:856106ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610680 r8:80287e08 r7:ebb1de60 r6:85610700 r5:84885400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb39fb0 to 0xebb39ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560d100 INFO: task kworker/0:777:5469 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8e326000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:778:5470 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:778 state:D stack:0 pid:5470 tgid:5470 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8575a78c r4:8575a400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85783c00 r8:856107ac r7:82804d40 r6:dddced80 r5:dddceda0 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018005 r8:85785400 r7:00000000 r6:83018000 r5:00001000 r4:7f0bb000 r5:8575ab8c r4:8575a800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85610800 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/0:780:5476 blocked for more than 476 seconds. r10:8291a684 r9:ebb59d84 r8:00000002 r7:60000113 r6:ebb59d8c r5:85786c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb59e08 r9:83018005 r8:85786c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0bf000 r5:8575b38c r4:8575b000 r10:61c88647 r9:85786c00 r8:856108ac r7:82804d40 r6:dddced80 r5:dddceda0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560d400 INFO: task kworker/0:780:5476 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8ec15000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:781:5477 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:781 state:D stack:0 pid:5477 tgid:5477 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb65d84 r8:00000002 r7:60000113 r6:ebb65d8c r5:85783000 r4:85783000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85783000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb65e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560d8c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85783000 r7:00000000 r6:83018000 r5:00001000 r4:7f0c3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb61000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575bb8c r4:8575b800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575bb8c r4:85610900 r10:61c88647 r9:85783000 r8:8561092c r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560d740 r5:8575b78c r4:8575b400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575b78c r4:85610980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85786000 r8:856109ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610980 r8:80287e08 r7:ebb65e60 r6:855f0680 r5:85786000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb75fb0 to 0xebb75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560d6c0 INFO: task kworker/0:782:5480 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8f30e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:783:5481 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:783 state:D stack:0 pid:5481 tgid:5481 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb79d84 r8:00000002 r7:60000113 r6:ebb79d8c r5:856c6c00 r4:856c6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:856c6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb79e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560d980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:856c6c00 r7:00000000 r6:83018000 r5:00001000 r4:7f0c5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb7b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8575bf8c r4:8575bc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8575bf8c r4:85610a00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:856c6c00 r8:85610a2c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610a00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610a00 r8:80287e08 r7:ebb65e60 r6:855f0700 r5:856c6c00 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:8560d800 Workqueue: events bpf_prog_free_deferred r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 dd20: 8f67e000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:82ac21e4 r4:e043ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 INFO: task kworker/0:784:5483 blocked for more than 476 seconds. Workqueue: events bpf_prog_free_deferred r5:85780000 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb85e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8560dd40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85780000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb81000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576438c r4:85764000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576438c r4:85610a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85780000 r8:85610aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610a80 r8:80287e08 r7:ebb79e60 r6:855f0780 r5:85780000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb85fb0 to 0xebb85ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8560d9c0 INFO: task kworker/0:784:5483 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 8fb2e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:785:5485 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:785 state:D stack:0 pid:5485 tgid:5485 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb8dd84 r8:00000002 r7:60000113 r6:ebb8dd8c r5:85784800 r4:85784800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85784800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb8de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r9:83018005 r8:85784800 r7:00000000 r6:83018000 r5:00001000 r4:7f095000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r4:82ac21e4 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 task:kworker/1:390 state:D stack:0 pid:5489 tgid:5489 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r9:83018205 r8:85788000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 r5:85702b8c r4:85702800 r10:61c88647 r9:85788000 r8:855f08ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:391:5490 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:391 state:D stack:0 pid:5490 tgid:5490 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r4:85788c00 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85702f8c r4:85702c00 r10:61c88647 r9:85788c00 r8:855f09ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:e043ddc0 r5:84b4f38c r4:84b4f000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb7d1d84 r8:00000002 r7:60000013 r6:eb7d1d8c r5:85789800 r4:85789800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85789800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb7d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85789800 r7:00000000 r6:83018200 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaf2b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8570338c r4:85703000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8570338c r4:855f0b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85789800 r8:855f0b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0b00 r8:80287e08 r7:ebb31e60 r6:855f0b80 r5:85789800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb7d1fb0 to 0xeb7d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85677680 INFO: task kworker/1:392:5492 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:800f0113 r4:80239bb0 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:00000000 r4:00000000 r5:8570378c r4:85703400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:855f0a80 r8:80287e08 r7:ebb31e60 r6:855f0c00 r5:8578a400 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:00000000 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 task:kworker/1:394 state:D stack:0 pid:5497 tgid:5497 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:856779c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8578b000 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb125000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85703f8c r4:85703c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:85703f8c r4:855f0c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578b000 r8:855f0cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0c80 r8:80287e08 r7:ebb31e60 r6:855f0d00 r5:8578b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9f9fb0 to 0xeb9f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85677780 INFO: task kworker/1:394:5497 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 90d0e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:786:5499 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:786 state:D stack:0 pid:5499 tgid:5499 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba01d84 r8:00000002 r7:60000113 r6:eba01d8c r5:8578bc00 r4:8578bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba01e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fa5c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8578bc00 r7:00000000 r6:83018000 r5:00001000 r4:7f03f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb595000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576478c r4:85764400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576478c r4:85610b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578bc00 r8:85610bac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85610b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85610b80 r8:80287e08 r7:ebb8de60 r6:855f0d80 r5:8578bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba01fb0 to 0xeba01ff8) 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:395:5500 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:395 state:D stack:0 pid:5500 tgid:5500 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:eba59d84 r8:00000002 r7:60000113 r6:eba59d8c r5:84886c00 r9:83018205 r8:84886c00 r7:00000000 r6:83018200 r5:00001000 r4:7f035000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r5:00001000 r4:e0447000 r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:396:5502 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:396 state:D stack:0 pid:5502 tgid:5502 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857c038c r4:857c0000 r10:00000000 r9:855f0e80 r8:80287e08 r7:eba59e60 r6:85610c80 r5:84886000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 INFO: task kworker/1:397:5504 blocked for more than 476 seconds. r10:8291a684 r9:ebba5d84 r8:00000002 r7:60000113 r6:ebba5d8c r5:84884800 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857c0b8c r4:857c0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855f0f00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0f00 r8:80287e08 r7:ebb9de60 r6:85610d00 r5:84884800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba5fb0 to 0xebba5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85677c80 INFO: task kworker/1:397:5504 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 916c4000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:398:5505 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:398 state:D stack:0 pid:5505 tgid:5505 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebba9d84 r8:00000002 r7:60000013 r6:ebba9d8c r5:84788000 r4:84788000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84788000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebba9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85677d40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84788000 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb410000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c078c r4:857c0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c078c r4:855f0f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84788000 r8:855f0fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855f0f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f0f80 r8:80287e08 r7:ebba5e60 r6:85610d80 r5:84788000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebba9fb0 to 0xebba9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85677c80 INFO: task kworker/1:398:5505 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 916c4000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84aecb80 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:8478a400 r4:8291a680 r9:83018205 r8:8478a400 r7:00000000 r6:83018200 r5:00001000 r4:7f041000 r5:857c138c r4:857c1000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855fb000 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:400:5509 blocked for more than 476 seconds. r4:84788c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb9e08 r5:00001000 r4:eb4c3000 r5:857c0f8c r4:857c0c00 r7:ddde2d80 r6:83018200 r5:857c0f8c r4:855fb080 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 91bb1000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 task:kworker/0:787 state:D stack:0 pid:5512 tgid:5512 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:8478b000 r8:85610f2c r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:00001000 r4:e0447000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r10:8291a684 r9:ebbbdd84 r8:00000002 r7:60000113 r6:ebbbdd8c r5:8478bc00 r4:8478bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbbde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fc0c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c178c r4:857c1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c178c r4:855fb100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8478bc00 r8:855fb12c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fb100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fb100 r8:80287e08 r7:ebbb5e60 r6:855f9000 r5:8478bc00 r4:85677e80 dd20: 9231b000 e0435000 00000001 80239b98 7f4e1000 00000001 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r4:00000001 INFO: task kworker/1:402:5516 blocked for more than 476 seconds. [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r7:ddde2d80 r6:83018200 r5:857c238c r4:855fb180 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:403:5517 blocked for more than 476 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:403 state:D stack:0 pid:5517 tgid:5517 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbcdd84 r8:00000002 r7:60000113 r6:ebbcdd8c r5:8478c800 r4:8478c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbcde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fc300 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8478c800 r7:00000000 r6:83018200 r5:00001000 r4:7f045000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb603000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c1b8c r4:857c1800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c1b8c r4:855fb200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:855fc280 Exception stack(0xe043dd28 to 0xe043dd70) dd20: 92731000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857c1f8c r4:857c1c00 r10:61c88647 r9:8478d400 r8:855fb2ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:405:5521 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:405 state:D stack:0 pid:5521 tgid:5521 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc01d84 r8:00000002 r7:60000013 r6:ebc01d8c r5:8478ec00 r4:8478ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8478ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc01e08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r10:61c88647 r9:8478ec00 r8:855fb32c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd20: 92797000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 r4:84b0e300 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:84789800 r7:00000000 r6:83018200 r5:00001000 r4:7f04b000 r5:857c278c r4:857c2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:855fb380 Exception stack(0xebc09fb0 to 0xebc09ff8) r4:855fc780 Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:407:5525 blocked for more than 477 seconds. r4:85800c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc11e08 r5:00001000 r4:eb7d5000 r7:ddde2d80 r6:83018200 r5:857c2b8c r4:855fb400 r4:855fc640 INFO: task kworker/1:407:5525 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 92f98000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:84aecb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857c2f8c r4:857c2c00 r4:855fb480 r4:855fc700 Exception stack(0xe043dd28 to 0xe043dd70) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r5:85801800 r4:8291a680 r4:00000000 r5:857c338c r4:857c3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c338c r4:855fb500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85801800 r8:855fb52c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fb500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fb500 r8:80287e08 r7:ebc01e60 r6:855f9400 r5:85801800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc29fb0 to 0xebc29ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855fc700 INFO: task kworker/1:409:5529 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 93360000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fcb00 r10:61c88647 r9:85803c00 r8:855fb5ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855fca00 INFO: task kworker/1:410:5531 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 93360000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:00000000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 INFO: task kworker/1:411:5533 blocked for more than 477 seconds. r4:00000000 r5:857c3b8c r4:857c3800 r10:61c88647 r9:85802400 r8:855fb62c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Workqueue: events bpf_prog_free_deferred r4:e043ddc0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) INFO: task kworker/1:412:5535 blocked for more than 477 seconds. [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) dd20: 93fe7000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:413:5537 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:413 state:D stack:0 pid:5537 tgid:5537 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebbb1d84 r8:00000002 r7:60000113 r6:ebbb1d8c r5:8578c800 r4:8578c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebbb1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855fab40 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855fb700 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 94244000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:415:5541 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:415 state:D stack:0 pid:5541 tgid:5541 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc4dd84 r8:00000002 r7:60000113 r6:ebc4dd8c r5:8578ec00 r4:8578ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8578ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:855fb900 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc51d84 r8:00000002 r7:60000113 r6:ebc51d8c r5:85790000 r4:85790000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85790000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc51e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85589400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85790000 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9db000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576538c r4:85765000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:8576538c r4:855fba00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85790000 r8:855fba2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fba00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fba00 r8:80287e08 r7:ebc4de60 r6:855fba80 r5:85790000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc51fb0 to 0xebc51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558a180 INFO: task kworker/1:416:5543 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 94490000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:788 state:D stack:0 pid:5546 tgid:5546 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eb9a5d84 r8:00000002 r7:60000113 r6:eb9a5d8c r5:85806000 r4:85806000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85806000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eb9a5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558a540 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85806000 r7:00000000 r6:83018000 r5:00001000 r4:7f099000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c8f8c r4:857c8c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:857c8f8c r4:855f9600 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85806000 r8:855f962c r7:82804d40 r6:dddced80 r5:dddceda0 r4:855f9600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f9600 r8:80287e08 r7:ebb8de60 r6:855f9680 r5:85806000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeb9a5fb0 to 0xeb9a5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855892c0 INFO: task kworker/0:788:5546 is blocked on a mutex likely owned by task kworker/0:174:3633. Workqueue: events bpf_prog_free_deferred [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:82ac21e4 r4:e043ddc0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:417:5548 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:417 state:D stack:0 pid:5548 tgid:5548 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc59d84 r8:00000002 r7:60000013 r6:ebc59d8c r5:85805400 r4:85805400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85805400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc59e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558a740 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85805400 r7:00000000 r6:83018200 r5:00001000 r4:7f09b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c938c r4:857c9000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c938c r4:855fbb00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85805400 r8:855fbb2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fbb00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fbb00 r8:80287e08 r7:ebc4de60 r6:855f9700 r5:85805400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc59fb0 to 0xebc59ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558a3c0 INFO: task kworker/1:417:5548 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9484b000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 task:kworker/0:789 state:D stack:0 pid:5550 tgid:5550 ppid:2 task_flags:0x4208060 flags:0x00000000 r5:85806c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc5de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855952c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85806c00 r7:00000000 r6:83018000 r5:00001000 r4:7f06f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb871000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85765f8c r4:85765c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85765f8c r4:855f9780 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85806c00 r8:855f97ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855f9780 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f9780 r8:80287e08 r7:eb9a5e60 r6:855f9800 r5:85806c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc5dfb0 to 0xebc5dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85589580 INFO: task kworker/0:789:5550 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 r5:00001000 r4:eba0f000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 94f7c000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe043dfb0 to 0xe043dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:419:5554 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:419 state:D stack:0 pid:5554 tgid:5554 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc69d84 r8:00000002 r7:60000013 r6:ebc69d8c r5:84883000 r4:84883000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84883000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc69e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558a940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84883000 r7:00000000 r6:83018200 r5:00001000 r4:7f09f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba29000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857c9b8c r4:857c9800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857c9b8c r4:855fbc00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84883000 r8:855fbc2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fbc00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fbc00 r8:80287e08 r7:ebc4de60 r6:855f9900 r5:84883000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc69fb0 to 0xebc69ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 94f7c000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r10:8291a684 r9:ebc71d84 r8:00000002 r7:60000113 r6:ebc71d8c r5:848c0c00 r5:00001000 r4:dfa97000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba5de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 95397000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r5:848c2400 r4:8291a680 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558aec0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dd20: 9581b000 e0435000 00000001 80239b98 7f4e1000 00000001 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebc61d84 r8:00000002 r7:60000113 r6:ebc61d8c r5:848c3000 r4:848c3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:848c3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc61e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8558afc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c3000 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eacc3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cab8c r4:857ca800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cab8c r4:855fbd80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c3000 r8:855fbdac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fbd80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fbd80 r8:80287e08 r7:ebc4de60 r6:855f9b80 r5:848c3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc61fb0 to 0xebc61ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558af40 INFO: task kworker/1:422:5563 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eadb7000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857caf8c r4:857cac00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857caf8c r4:855fbe00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85790c00 r8:855fbe2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:855fbe00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855fbe00 r8:80287e08 r7:ebc4de60 r6:855fbe80 r5:85790c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xeba95fb0 to 0xeba95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8558af40 INFO: task kworker/1:423:5565 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 95c50000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:424:5568 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:424 state:D stack:0 pid:5568 tgid:5568 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba81d84 r8:00000002 r7:60000113 r6:eba81d8c r5:85792400 r4:85792400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85792400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba81e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e1140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85792400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb037000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cb38c r4:857cb000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85792400 r8:855fbf2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:00000001 dfa0: 00000000 00000000 00000000 00000000 r4:84b0e300 Not tainted 6.15.0-rc7-syzkaller #0 Workqueue: events bpf_prog_free_deferred r10:8291a684 r9:ebc6dd84 r8:00000002 r7:60000013 r6:ebc6dd8c r5:85794800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e12c0 r5:00001000 r4:eb241000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cb78c r4:857cb400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cb78c r4:85596000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85794800 r8:8559602c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596000 r8:80287e08 r7:ebc4de60 r6:85596080 r5:85794800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc6dfb0 to 0xebc6dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1200 INFO: task kworker/1:425:5570 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 95e33000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:426:5571 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:426 state:D stack:0 pid:5571 tgid:5571 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebaf5d84 r8:00000002 r7:60000113 r6:ebaf5d8c r5:85795400 r4:85795400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85795400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebaf5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855e1680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857cbb8c r4:857cb800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857cbb8c r4:85596100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85795400 r8:8559612c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596100 r8:80287e08 r7:ebc4de60 r6:85596180 r5:85795400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebaf5fb0 to 0xebaf5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1200 INFO: task kworker/1:426:5571 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9610a000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85796000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb05e08 r5:00001000 r4:eb7ef000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:00000001 Exception stack(0xebb05fb0 to 0xebb05ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85589d00 INFO: task kworker/0:791:5572 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 963bb000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:427 state:D stack:0 pid:5574 tgid:5574 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:eba9dd84 r8:00000002 r7:60000113 r6:eba9dd8c r5:85796c00 r4:85796c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85796c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:eba9de08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb699000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d078c r4:857d0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d078c r4:85596280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85796c00 r8:855962ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) r4:84b0e300 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb69e08 r5:00001000 r4:eb67b000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85596380 r8:80287e08 r7:eba9de60 r6:855f9c80 r5:848c3c00 r4:855e1880 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:429:5579 blocked for more than 477 seconds. r5:848c6c00 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebc75e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84a2c2c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:848c6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb809000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d178c r4:857d1400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d178c r4:85596400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c6c00 r8:8559642c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596400 r8:80287e08 r7:eba9de60 r6:855f9d00 r5:848c6c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebc75fb0 to 0xebc75ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1980 INFO: task kworker/1:429:5579 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 967ac000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 Not tainted 6.15.0-rc7-syzkaller #0 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd20: 96c24000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:e043ddc0 r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:00001000 r4:eb707000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d0f8c r4:85596500 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c0000 r8:8559652c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596500 r8:80287e08 r7:ebc75e60 r6:855f9e00 r5:848c0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec491fb0 to 0xec491ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1ac0 INFO: task kworker/1:431:5582 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 97157000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:432:5583 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:848c5400 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d1f8c r4:857d1c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:433:5587 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:433 state:D stack:0 pid:5587 tgid:5587 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb51d84 r8:00000002 r7:60000113 r6:ebb51d8c r5:848c4800 r4:848c4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb81d000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:848c4800 r8:8559662c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596600 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596600 r8:80287e08 r7:ec495e60 r6:855f9f00 r5:848c4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb51fb0 to 0xebb51ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855e1ec0 INFO: task kworker/1:433:5587 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 97489000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred r5:85798000 r4:8291a680 r4:00000000 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855951c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85765b8c r4:85765800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85765b8c r4:855f9f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85798000 r8:855f9fac r7:82804d40 r6:dddced80 r5:dddceda0 r4:855f9f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:855f9f80 r8:80287e08 r7:ebc5de60 r6:85580000 r5:85798000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec499fb0 to 0xec499ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8567d880 INFO: task kworker/0:792:5588 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 97722000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:e043ddc0 r5:84b4f38c r4:84b4f000 Exception stack(0xe043dfb0 to 0xe043dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:85791800 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:00001000 r4:eb88f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:85580080 r8:80287e08 r7:ebc5de60 r6:85596680 r5:85791800 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r5:00001000 r4:e0447000 r4:00000001 INFO: task kworker/0:794:5594 blocked for more than 477 seconds. [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4ade08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85595e00 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8578d400 r7:00000000 r6:83018000 r5:00001000 r4:7f043000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8d3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85766f8c r4:85766c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85766f8c r4:85580100 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8578d400 r8:8558012c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580100 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580100 r8:80287e08 r7:ec4a5e60 r6:85596700 r5:8578d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4adfb0 to 0xec4adff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85595380 INFO: task kworker/0:794:5594 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 97e79000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:795:5595 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:795 state:D stack:0 pid:5595 tgid:5595 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4b1d84 r8:00000002 r7:60000113 r6:ec4b1d8c r5:85793000 r4:85793000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85793000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85595680 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85793000 r7:00000000 r6:83018000 r5:00001000 r4:7f041000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb7e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85766b8c r4:85766800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85766b8c r4:85580180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85793000 r8:855801ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580180 r8:80287e08 r7:ec4ade60 r6:85596780 r5:85793000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4b1fb0 to 0xec4b1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85595380 INFO: task kworker/0:795:5595 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9861e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec4b5fb0 to 0xec4b5ff8) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Not tainted 6.15.0-rc7-syzkaller #0 task:kworker/1:435 state:D stack:0 pid:5599 tgid:5599 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4a9d84 r8:00000002 r7:60000013 r6:ec4a9d8c r5:857a1800 r4:857a1800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a1800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4a9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:855825c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a1800 r7:00000000 r6:83018200 r5:00001000 r4:7f075000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8b9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d238c r4:857d2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d238c r4:85596900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a1800 r8:8559692c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596900 r8:80287e08 r7:ec4b5e60 r6:85596980 r5:857a1800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4a9fb0 to 0xec4a9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85582500 INFO: task kworker/1:435:5599 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9861e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r4:84aecb80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Not tainted 6.15.0-rc7-syzkaller #0 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d2f8c r4:857d2c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:85596a00 r8:80287e08 r7:ec4b5e60 r6:85596a80 r5:857a2400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb4dfb0 to 0xebb4dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85582680 INFO: task kworker/1:436:5602 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9861e000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:437:5603 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:437 state:D stack:0 pid:5603 tgid:5603 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec49dd84 r8:00000002 r7:60000013 r6:ec49dd8c r5:857a3000 r4:857a3000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a3000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec49de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85582840 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a3000 r7:00000000 r6:83018200 r5:00001000 r4:7f029000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaba3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d2b8c r4:857d2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d2b8c r4:85596b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a3000 r8:85596b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596b00 r8:80287e08 r7:ebb4de60 r6:85596b80 r5:857a3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec49dfb0 to 0xec49dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 task:kworker/1:438 state:D stack:0 pid:5605 tgid:5605 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 r4:00000000 r5:00001000 r4:eb085000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d338c r4:857d3000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d338c r4:85596c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a3c00 r8:85596c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596c00 r8:80287e08 r7:ebb4de60 r6:85596c80 r5:857a3c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebbc1fb0 to 0xebbc1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:855829c0 INFO: task kworker/1:438:5605 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 99341000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:439:5607 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:439 state:D stack:0 pid:5607 tgid:5607 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4b9d84 r8:00000002 r7:60000013 r6:ec4b9d8c r5:857a4800 r4:857a4800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a4800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4b9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85582e80 r5:00001000 r4:eb385000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:00000001 INFO: task kworker/1:440:5608 blocked for more than 477 seconds. r4:85798c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c1e08 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85596e00 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:441:5612 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:441 state:D stack:0 pid:5612 tgid:5612 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4d1d84 r8:00000002 r7:60000113 r6:ec4d1d8c r5:8579bc00 r4:8579bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f033000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb449000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d3f8c r4:857d3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d3f8c r4:85596e80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579bc00 r8:85596eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596e80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596e80 r8:80287e08 r7:ec4b9e60 r6:85580280 r5:8579bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4d1fb0 to 0xec4d1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f0000 INFO: task kworker/1:441:5612 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 99739000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:442:5614 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:442 state:D stack:0 pid:5614 tgid:5614 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r4:8579a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4d9e08 r5:00001000 r4:eb49f000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d438c r4:857d4000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Workqueue: events bpf_prog_free_deferred [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:eb785000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d538c r4:857d5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d538c r4:85596f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579c800 r8:85596fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85596f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85596f80 r8:80287e08 r7:ec4d9e60 r6:85580380 r5:8579c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4ddfb0 to 0xec4ddff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f02c0 INFO: task kworker/1:443:5615 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 99d0f000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:445:5618 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:445 state:D stack:0 pid:5618 tgid:5618 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4bdd84 r8:00000002 r7:60000113 r6:ec4bdd8c r5:857a5400 r4:857a5400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a5400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4bde08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a5400 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb5d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d4b8c r4:857d4800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d4b8c r4:854f7080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a5400 r8:854f70ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7080 r8:80287e08 r7:ec4dde60 r6:854f7100 r5:857a5400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4bdfb0 to 0xec4bdff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f0340 INFO: task kworker/1:445:5618 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9a202000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:446:5621 blocked for more than 477 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:446 state:D stack:0 pid:5621 tgid:5621 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4e9d84 r8:00000002 r7:60000113 r6:ec4e9d8c r5:857a6000 r4:857a6000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a6000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4e9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0600 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a6000 r7:00000000 r6:83018200 r5:00001000 r4:7f03b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb621000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d4f8c r4:857d4c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d4f8c r4:854f7180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec4e9fb0 to 0xec4e9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f0540 INFO: task kworker/1:446:5621 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 dd20: 9abcc000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) Not tainted 6.15.0-rc7-syzkaller #0 r4:857a0000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4c5e08 r5:00001000 r4:eb8ed000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:796 state:D stack:0 pid:5626 tgid:5626 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4f9d84 r8:00000002 r7:60000113 r6:ec4f9d8c r5:857a8000 r4:857a8000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a8000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854ef980 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:857a8000 r7:00000000 r6:83018000 r5:00001000 r4:7f07f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8576738c r4:85767000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8576738c r4:85580480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a8000 r8:855804ac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580480 r8:80287e08 r7:ec4ade60 r6:854f7380 r5:857a8000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4f9fb0 to 0xec4f9ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85595c00 INFO: task kworker/0:796:5626 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9abcc000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec4edd84 r8:00000002 r7:60000113 r6:ec4edd8c r5:85799800 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:8576778c r4:85767400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r4:e043ddc0 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r4:84aecb80 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:448:5629 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:448 state:D stack:0 pid:5629 tgid:5629 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec4f1d84 r8:00000002 r7:60000013 r6:ec4f1d8c r5:8579d400 r4:8579d400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579d400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec4f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0d80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579d400 r7:00000000 r6:83018200 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb905000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d5b8c r4:857d5800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d5b8c r4:854f7400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8579d400 r8:854f742c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7400 r8:80287e08 r7:ec4c5e60 r6:85580600 r5:8579d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec4f1fb0 to 0xec4f1ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f09c0 INFO: task kworker/1:448:5629 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) Exception stack(0xe043dfb0 to 0xe043dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec511e08 r5:857d638c r4:857d6000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854f7480 r8:80287e08 r7:ec4f1e60 r6:85580680 r5:85793c00 Workqueue: events bpf_prog_free_deferred [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9b0e1000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:450:5634 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:450 state:D stack:0 pid:5634 tgid:5634 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec519d84 r8:00000002 r7:60000113 r6:ec519d8c r5:8579e000 r4:8579e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8579e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec519e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854f0e40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8579e000 r7:00000000 r6:83018200 r5:00001000 r4:7f049000 r5:857d5f8c r4:857d5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:00000000 r5:84b4f38c r4:84b4f000 r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:451:5635 blocked for more than 478 seconds. r4:84970000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec51de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857d738c r4:857d7000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d738c r4:854f7580 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970000 r8:854f75ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7580 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7580 r8:80287e08 r7:ec511e60 r6:85580780 r5:84970000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec51dfb0 to 0xec51dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854f0e80 INFO: task kworker/1:451:5635 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9b809000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r4:00000000 r5:857d678c r4:857d6400 r7:ddde2d80 r6:83018200 r5:857d678c r4:854f7600 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:453:5640 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:453 state:D stack:0 pid:5640 tgid:5640 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec531d84 r8:00000002 r7:60000113 r6:ec531d8c r5:84970c00 r4:84970c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84970c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec531e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e6040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84970c00 r7:00000000 r6:83018200 r5:00001000 r4:7f077000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb95f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d6b8c r4:857d6800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d6b8c r4:854f7680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84970c00 r8:854f76ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7680 r8:80287e08 r7:ec51de60 r6:85580880 r5:84970c00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec531fb0 to 0xec531ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e6000 INFO: task kworker/1:453:5640 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:454:5641 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:454 state:D stack:0 pid:5641 tgid:5641 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec535d84 r8:00000002 r7:60000113 r6:ec535d8c r5:84972400 r4:84972400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84972400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec535e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e6200 r5:857d6f8c r4:857d6c00 r4:854f7700 r4:854e6000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:e043ddc0 r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec539d84 r8:00000002 r7:60000113 r6:ec539d8c r5:84973c00 r4:00000000 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:61c88647 r9:84973c00 r8:854f77ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:456:5646 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:456 state:D stack:0 pid:5646 tgid:5646 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec53dd84 r8:00000002 r7:60000013 r6:ec53dd8c r5:84974800 r4:84974800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84974800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec53de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e6400 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84974800 r7:00000000 r6:83018200 r5:00001000 r4:7f07d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9d5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857d778c r4:857d7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d778c r4:854f7800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84974800 r8:854f782c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7800 r8:80287e08 r7:ec539e60 r6:85580a00 r5:84974800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec53dfb0 to 0xec53dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e6440 INFO: task kworker/1:456:5646 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. Call trace: r4:84975400 r5:84975400 r4:8291a680 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r4:00000000 r5:00001000 r4:eba3d000 r5:857d7f8c r4:857d7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857d7f8c r4:854f7880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84975400 r8:854f78ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7880 r10:00000000 r9:854f7880 r8:80287e08 r7:ec539e60 r6:85580a80 r5:84975400 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:00000000 Exception stack(0xe043dd28 to 0xe043dd70) dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:798:5650 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:798 state:D stack:0 pid:5650 tgid:5650 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec505d84 r8:00000002 r7:60000113 r6:ec505d8c r5:84976000 r4:84976000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84976000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec505e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854eff40 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84976000 r7:00000000 r6:83018000 r5:00001000 r4:7f089000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba65000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85767f8c r4:85767c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85767f8c r4:85580b00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84976000 r8:85580b2c r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xec505fb0 to 0xec505ff8) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:799:5651 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. r5:84976c00 r4:8291a680 r4:00000000 r5:85767b8c r4:85767800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85767b8c r4:85580c00 r4:85580c00 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:458:5653 blocked for more than 478 seconds. r4:8579ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec549e08 r4:00000000 r5:857e038c r4:857e0000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854f7900 Exception stack(0xec549fb0 to 0xec549ff8) r4:854e6800 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:800:5657 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:800 state:D stack:0 pid:5657 tgid:5657 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec509d84 r8:00000002 r7:60000113 r6:ec509d8c r5:85818000 r4:85818000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85818000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec509e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8543d2c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85818000 r7:00000000 r6:83018000 r5:00001000 r4:7f02d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb37f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584438c r4:85844000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8584438c r4:85580d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85818000 r8:85580dac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85580d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85580d80 r8:80287e08 r7:ec505e60 r6:85580e00 r5:85818000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec509fb0 to 0xec509ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854efec0 INFO: task kworker/0:800:5657 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec545e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:8495578c r4:84955400 r10:61c88647 r9:85818c00 r8:85580eac r7:82804d40 r6:dddced80 r5:dddceda0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:84b4f38c r4:84b4f000 r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:459:5659 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:459 state:D stack:0 pid:5659 tgid:5659 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec551d84 r8:00000002 r7:60000113 r6:ec551d8c r5:85819800 r4:85819800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85819800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec551e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e6940 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85819800 r7:00000000 r6:83018200 r5:00001000 r4:7f08f000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebaa1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e078c r4:857e0400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e078c r4:854f7980 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85819800 r8:854f79ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7980 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7980 r8:80287e08 r7:ec549e60 r6:85580f80 r5:85819800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec551fb0 to 0xec551ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e69c0 INFO: task kworker/1:459:5659 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9d62d000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:84b4f38c r4:84b4f000 r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/0:802:5662 blocked for more than 478 seconds. r4:8581a400 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec54de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:dddced80 r6:83018000 r5:8495538c r4:854e3000 r10:00000000 r9:854e3000 r8:80287e08 r7:ec509e60 r6:854e3080 r5:8581a400 r4:84a2c440 Workqueue: events bpf_prog_free_deferred [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9e037000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:460:5663 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:460 state:D stack:0 pid:5663 tgid:5663 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec559d84 r8:00000002 r7:60000113 r6:ec559d8c r5:8581b000 r4:8581b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8581b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec559e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:857e0b8c r4:857e0800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e0b8c r4:854f7a00 r4:854f7a00 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Exception stack(0xe043dd28 to 0xe043dd70) r4:00000000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 task:kworker/1:461 state:D stack:0 pid:5666 tgid:5666 ppid:2 task_flags:0x4208060 flags:0x00000000 r9:83018205 r8:8581d400 r7:00000000 r6:83018200 r5:00001000 r4:7f097000 r10:61c88647 r9:8581d400 r8:854f7aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec565fb0 to 0xec565ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e6cc0 INFO: task kworker/1:461:5666 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9e650000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:462:5668 blocked for more than 478 seconds. r4:8581ec00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec56de08 r9:83018205 r8:8581ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f093000 r5:857e0f8c r4:857e0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8581ec00 r8:854f7b2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aecb80 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec575d84 r8:00000002 r7:60000013 r6:ec575d8c r5:8581c800 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebae3000 r5:857e138c r4:857e1000 r7:ddde2d80 r6:83018200 r5:857e138c r4:854f7c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581c800 r8:854f7c2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7c00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7c00 r8:80287e08 r7:ec565e60 r6:854e3280 r5:8581c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec575fb0 to 0xec575ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e65c0 INFO: task kworker/1:463:5670 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9eb4d000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:464:5671 blocked for more than 478 seconds. r4:8581e000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec579e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857e238c r4:857e2000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e238c r4:854f7b80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581e000 r8:854f7bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7b80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7b80 r8:80287e08 r7:ec565e60 r6:854e3300 r5:8581e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec579fb0 to 0xec579ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e6580 INFO: task kworker/1:464:5671 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9eb4d000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857e1b8c r4:857e1800 r10:61c88647 r9:85820c00 r8:854f7cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:00000001 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:466:5675 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:466 state:D stack:0 pid:5675 tgid:5675 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ebb95d84 r8:00000002 r7:60000113 r6:ebb95d8c r5:85820000 r4:85820000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85820000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ebb95e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9140 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85820000 r7:00000000 r6:83018200 r5:00001000 r4:7f00b000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:df973000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e1f8c r4:857e1c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e1f8c r4:854f7d00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85820000 r8:854f7d2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7d00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7d00 r8:80287e08 r7:ec579e60 r6:854e3400 r5:85820000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xebb95fb0 to 0xebb95ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e9280 INFO: task kworker/1:466:5675 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9f328000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:467:5677 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:467 state:D stack:0 pid:5677 tgid:5677 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec58dd84 r8:00000002 r7:60000113 r6:ec58dd8c r5:85823000 r4:85823000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85823000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec58de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e96c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85823000 r7:00000000 r6:83018200 r5:00001000 r4:7f055000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb20f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e2f8c r4:857e2c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e2f8c r4:854f7e00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85823000 r8:854f7e2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7e00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7e00 r8:80287e08 r7:ec579e60 r6:854e3480 r5:85823000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec58dfb0 to 0xec58dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e9100 INFO: task kworker/1:467:5677 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9f577000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:468:5679 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:468 state:D stack:0 pid:5679 tgid:5679 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec595d84 r8:00000002 r7:60000013 r6:ec595d8c r5:85822400 r4:85822400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85822400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec595e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9380 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85822400 r7:00000000 r6:83018200 r5:00001000 r4:7f051000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eaa71000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e278c r4:857e2400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e278c r4:854f7d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85822400 r8:854f7dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854f7d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854f7d80 r8:80287e08 r7:ec58de60 r6:854e3500 r5:85822400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec595fb0 to 0xec595ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e9200 INFO: task kworker/1:468:5679 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: 9f7cd000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:469:5681 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 r10:8291a684 r9:ec599d84 r8:00000002 r7:60000113 r6:ec599d8c r5:85823c00 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e95c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85823c00 r7:00000000 r6:83018200 r5:00001000 r4:7f053000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ead4f000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e2b8c r4:857e2800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85823c00 r8:854f7eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:470:5684 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:470 state:D stack:0 pid:5684 tgid:5684 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5a1d84 r8:00000002 r7:60000113 r6:ec5a1d8c r5:85825400 r4:85825400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85825400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5a1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r9:83018205 r8:85825400 r7:00000000 r6:83018200 r5:00001000 r4:7f057000 r5:857e338c r4:857e3000 r10:00000000 r9:854f7f00 r8:80287e08 r7:ec58de60 r6:854e3600 r5:85825400 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:e043ddc0 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 Workqueue: events bpf_prog_free_deferred [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:857e4b8c r4:857e4800 r4:854f7f80 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r5:85824800 r4:8291a680 r4:00000000 r9:83018205 r8:85824800 r7:00000000 r6:83018200 r5:00001000 r4:7f059000 r5:857e378c r4:857e3400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:854d3000 dfa0: 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r7:ddde2d80 r6:83018200 r5:857e3b8c r4:854d3080 r10:00000000 r9:854d3080 r8:80287e08 r7:ec5b1e60 r6:854e3780 r5:85826c00 r4:854e97c0 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:474:5691 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:474 state:D stack:0 pid:5691 tgid:5691 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5d5d84 r8:00000002 r7:60000113 r6:ec5d5d8c r5:85821800 r4:85821800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85821800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5d5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9b80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85821800 r7:00000000 r6:83018200 r5:00001000 r4:7f05d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb6f3000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r5:857e3f8c r4:857e3c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85821800 r8:854d312c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) INFO: task kworker/1:475:5693 blocked for more than 478 seconds. r4:84978c00 r4:00000000 r4:00000000 r5:857e438c r4:857e4000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:84978c00 r8:854d322c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:00001000 r4:e0447000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r10:8291a684 r9:ec5e5d84 r8:00000002 r7:60000013 r6:ec5e5d8c r5:84978000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5e5e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e9dc0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:84978000 r7:00000000 r6:83018200 r5:00001000 r4:7f061000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb813000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e478c r4:857e4400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e478c r4:854d3280 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84978000 r8:854d32ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3280 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3280 r8:80287e08 r7:ec5b1e60 r6:854e3900 r5:84978000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5e5fb0 to 0xec5e5ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854e9c40 INFO: task kworker/1:476:5695 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a08c5000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:477:5697 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:477 state:D stack:0 pid:5697 tgid:5697 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5c9d84 r8:00000002 r7:60000113 r6:ec5c9d8c r5:8497a400 r4:8497a400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497a400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5c9e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857e4f8c r4:857e4c00 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:478:5700 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:478 state:D stack:0 pid:5700 tgid:5700 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec5f1d84 r8:00000002 r7:60000113 r6:ec5f1d8c r5:8497c800 r4:8497c800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497c800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f1e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c8200 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497c800 r7:00000000 r6:83018200 r5:00001000 r4:7f067000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb899000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e538c r4:857e5000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e538c r4:854d3300 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497c800 r8:854d332c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3300 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3300 r8:80287e08 r7:ec5c9e60 r6:854e3a00 r5:8497c800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec5f1fb0 to 0xec5f1ff8) 1fa0: 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred r4:857abc00 r4:00000000 r4:00000000 r5:857e5b8c r4:857e5800 r7:ddde2d80 r6:83018200 r5:857e5b8c r4:854d3380 r10:00000000 r9:854d3380 r8:80287e08 r7:ec5f1e60 r6:854d3400 r5:857abc00 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Exception stack(0xe043dfb0 to 0xe043dff8) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:480:5704 blocked for more than 478 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:480 state:D stack:0 pid:5704 tgid:5704 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec55dd84 r8:00000002 r7:60000113 r6:ec55dd8c r5:857ac800 r4:857ac800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857ac800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec55de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c8340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ac800 r7:00000000 r6:83018200 r5:00001000 r4:7f069000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb8c1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e578c r4:857e5400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e578c r4:854d3480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ac800 r8:854d34ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3480 r8:80287e08 r7:ec5e1e60 r6:854d3500 r5:857ac800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec55dfb0 to 0xec55dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c8240 INFO: task kworker/1:480:5704 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a12fe000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 task:kworker/1:481 state:D stack:0 pid:5706 tgid:5706 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec5f5e08 r5:00001000 r4:ebb87000 r5:857e6b8c r4:857e6800 r10:61c88647 r9:857ad400 r8:854d35ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r4:00000000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec621e08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854c86c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857ae000 r7:00000000 r6:83018200 r5:00001000 r4:7f06d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebb47000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e5f8c r4:857e5c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e5f8c r4:854d3680 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857ae000 r8:854d36ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3680 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3680 r8:80287e08 r7:ec5f5e60 r6:854d3700 r5:857ae000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec621fb0 to 0xec621ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c8640 INFO: task kworker/1:482:5709 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a194f000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred r5:857aec00 r4:8291a680 r4:00000000 r4:00000000 r5:857e638c r4:857e6000 r7:ddde2d80 r6:83018200 r5:857e638c r4:854d3780 9fa0: 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:8291a684 r9:ec625d84 r8:00000002 r7:60000113 r6:ec625d8c r5:857aa400 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:00001000 r4:ebb6d000 r5:857e678c r4:857e6400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e678c r4:854d3880 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857aa400 r8:854d38ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3880 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3880 r8:80287e08 r7:ec5f5e60 r6:854d3900 r5:857aa400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec625fb0 to 0xec625ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c8a00 INFO: task kworker/1:484:5712 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a21a8000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857e778c r4:857e7400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:854d3980 r8:80287e08 r7:ec5f5e60 r6:854d3a00 r5:857ab000 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xe043dfb0 to 0xe043dff8) Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings r4:857a9800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec62de08 r4:00000000 r5:857e6f8c r4:857e6c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e6f8c r4:854d3a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a9800 r8:854d3aac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3a80 r8:80287e08 r7:ec629e60 r6:854d3b00 r5:857a9800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec62dfb0 to 0xec62dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854c8d00 INFO: task kworker/1:486:5716 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a2639000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r9:83018205 r8:857a8c00 r7:00000000 r6:83018200 r5:00001000 r4:7f09d000 r5:857e738c r4:857e7000 r10:61c88647 r9:857a8c00 r8:854d3bac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:488:5720 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:488 state:D stack:0 pid:5720 tgid:5720 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec631d84 r8:00000002 r7:60000113 r6:ec631d8c r5:857a6c00 r4:857a6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857a6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec631e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857a6c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a1000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebbd1000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e7b8c r4:857e7800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e7b8c r4:854d3c80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857a6c00 r8:854d3cac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3c80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3c80 r8:80287e08 r7:ec629e60 r6:854d3d00 r5:857a6c00 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 Exception stack(0xe043dd28 to 0xe043dd70) r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec63dd84 r8:00000002 r7:60000113 r6:ec63dd8c r5:857b0000 r4:857b0000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b0000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec63de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3340 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:857b0000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a3000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc03000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857e7f8c r4:857e7c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857e7f8c r4:854d3d80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:857b0000 r8:854d3dac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3d80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3d80 r8:80287e08 r7:ec631e60 r6:854d3e00 r5:857b0000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec63dfb0 to 0xec63dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3100 INFO: task kworker/1:489:5722 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:857b0c00 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec639e08 r9:83018205 r8:857b0c00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a5000 r5:857ec38c r4:857ec000 r10:61c88647 r9:857b0c00 r8:854d3eac r7:82804d40 r6:ddde2d80 r5:ddde2da0 Exception stack(0xec639fb0 to 0xec639ff8) Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r4:84b0e300 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec649e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544f180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497d400 r7:00000000 r6:83018200 r5:00001000 r4:7f0bb000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec699000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eef8c r4:857eec00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857eef8c r4:854d3f80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497d400 r8:854d3fac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:854d3f80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:854d3f80 r8:80287e08 r7:ec639e60 r6:854e3a80 r5:8497d400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec649fb0 to 0xec649ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3400 INFO: task kworker/1:491:5726 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3254000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:492:5728 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:492 state:D stack:0 pid:5728 tgid:5728 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec651d84 r8:00000002 r7:60000113 r6:ec651d8c r5:8497ec00 r4:8497ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec651e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3580 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497ec00 r7:00000000 r6:83018200 r5:00001000 r4:7f0a7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ec78c r4:857ec400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ec78c r4:85554000 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497ec00 r8:8555402c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554000 r8:80287e08 r7:ec649e60 r6:854e3b00 r5:8497ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec651fb0 to 0xec651ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b35c0 INFO: task kworker/1:492:5728 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3254000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:493:5730 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:493 state:D stack:0 pid:5730 tgid:5730 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec659d84 r8:00000002 r7:60000113 r6:ec659d8c r5:8497e000 r4:8497e000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497e000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec659e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8497e000 r7:00000000 r6:83018200 r5:00001000 r4:7f0a9000 r5:857ecb8c r4:857ec800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ecb8c r4:85554080 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497e000 r8:855540ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554080 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554080 r8:80287e08 r7:ec649e60 r6:854e3b80 r5:8497e000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec659fb0 to 0xec659ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3940 INFO: task kworker/1:493:5730 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3c4c000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:494:5731 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:494 state:D stack:0 pid:5731 tgid:5731 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec65dd84 r8:00000002 r7:60000013 r6:ec65dd8c r5:8497b000 r4:8497b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec65de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r9:83018205 r8:8497b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0ab000 r5:857ecf8c r4:857ecc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ecf8c r4:85554100 r10:61c88647 r9:8497b000 r8:8555412c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r10:00000000 r9:85554100 r8:80287e08 r7:ec649e60 r6:854e3c00 r5:8497b000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3940 INFO: task kworker/1:494:5731 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3f73000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:495:5733 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:495 state:D stack:0 pid:5733 tgid:5733 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec665d84 r8:00000002 r7:60000113 r6:ec665d8c r5:8497bc00 r4:8497bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8497bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec665e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3900 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8497bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0ad000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc3d000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ed38c r4:857ed000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ed38c r4:85554180 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8497bc00 r8:855541ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554180 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554180 r8:80287e08 r7:ec649e60 r6:854e3c80 r5:8497bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec665fb0 to 0xec665ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3780 INFO: task kworker/1:495:5733 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a3f73000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:496:5735 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:496 state:D stack:0 pid:5735 tgid:5735 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec66dd84 r8:00000002 r7:60000013 r6:ec66dd8c r5:8581bc00 r4:8581bc00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8581bc00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec66de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3a80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8581bc00 r7:00000000 r6:83018200 r5:00001000 r4:7f0af000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ebc77000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ed78c r4:857ed400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ed78c r4:85554200 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8581bc00 r8:8555422c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554200 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554200 r8:80287e08 r7:ec649e60 r6:854e3d00 r5:8581bc00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec66dfb0 to 0xec66dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3880 INFO: task kworker/1:496:5735 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a43aa000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:497:5737 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:497 state:D stack:0 pid:5737 tgid:5737 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec67dd84 r8:00000002 r7:60000113 r6:ec67dd8c r5:84973000 r4:84973000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:84973000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec67de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) r4:00000000 r5:857edb8c r4:857ed800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857edb8c r4:85554280 r10:61c88647 r9:84973000 r8:855542ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: dd20: a4750000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:498:5740 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:498 state:D stack:0 pid:5740 tgid:5740 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec685d84 r8:00000002 r7:60000013 r6:ec685d8c r5:85828c00 r4:85828c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85828c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857edf8c r4:857edc00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857edf8c r4:85554300 r10:61c88647 r9:85828c00 r8:8555432c r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:00000000 r5:800f0113 r4:80239bb0 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r4:85829800 r5:85829800 r4:8291a680 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec689e08 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854b3e80 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:85829800 r7:00000000 r6:83018200 r5:00001000 r4:7f0b5000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5a5000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ee38c r4:857ee000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ee38c r4:85554380 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85829800 r8:855543ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554380 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554380 r8:80287e08 r7:ec649e60 r6:854e3e80 r5:85829800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec689fb0 to 0xec689ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3d00 INFO: task kworker/1:499:5741 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a51d9000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:500:5743 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:500 state:D stack:0 pid:5743 tgid:5743 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec691d84 r8:00000002 r7:60000013 r6:ec691d8c r5:8582b000 r4:8582b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8582b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec691e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:854e0880 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018205 r8:8582b000 r7:00000000 r6:83018200 r5:00001000 r4:7f0b7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec5ff000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857ee78c r4:857ee400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857ee78c r4:85554400 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8582b000 r8:8555442c r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554400 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554400 r8:80287e08 r7:ec649e60 r6:854e3f00 r5:8582b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec691fb0 to 0xec691ff8) 1fa0: 00000000 00000000 00000000 00000000 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854b3ec0 INFO: task kworker/1:500:5743 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:ec673000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:857eeb8c r4:857ee800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:ddde2d80 r6:83018200 r5:857eeb8c r4:85554480 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8582a400 r8:855544ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 r4:85554480 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554480 r8:80287e08 r7:ec649e60 r6:854e3f80 r5:8582a400 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec69dfb0 to 0xec69dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544f0c0 INFO: task kworker/1:501:5745 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a55b1000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:82ac21e4 r5:00001000 r4:e0447000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 Workqueue: events bpf_prog_free_deferred [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Exception stack(0xe043dd28 to 0xe043dd70) dd20: a55b1000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 Exception stack(0xe043dfb0 to 0xe043dff8) [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8544f3c0 r5:857ef78c r4:857ef400 r4:00000001 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:857eff8c r4:857efc00 r4:85554600 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a55b1000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r4:84b0e300 Workqueue: events bpf_prog_free_deferred [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:857efb8c r4:857ef800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:8582e000 r8:855546ac r7:82804d40 r6:ddde2d80 r5:ddde2da0 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 dd60: 80230ad0 80239bb0 800f0113 ffffffff r4:e043ddc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:803:5759 blocked for more than 479 seconds. [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) r5:8584478c r4:85844400 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) Exception stack(0xec671fb0 to 0xec671ff8) INFO: task kworker/0:803:5759 is blocked on a mutex likely owned by task kworker/0:174:3633. dd20: a5efe000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec701e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/1:506:5763 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:506 state:D stack:0 pid:5763 tgid:5763 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec705d84 r8:00000002 r7:60000113 r6:ec705d8c r5:85010000 r4:85010000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85010000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec705e08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:857f078c r4:857f0400 r10:61c88647 r9:85010000 r8:8555472c r7:82804d40 r6:ddde2d80 r5:ddde2da0 Call trace: dd20: a619b000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec70dd84 r8:00000002 r7:60000013 r6:ec70dd8c r5:857b2400 r4:857b2400 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b2400 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r4:00000000 r5:85844b8c r4:85844800 r10:00000000 r9:85446480 r8:80287e08 r7:ec701e60 r6:85554780 r5:857b2400 r5:800f0113 r4:80239bb0 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) Workqueue: events bpf_prog_free_deferred r9:83018205 r8:857b3c00 r7:00000000 r6:83018200 r5:00001000 r4:7f039000 r4:00000001 Call trace: r5:800f0113 r4:80239bb0 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) r4:84b0e300 r5:857b3000 r4:8291a680 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r10:61c88647 r9:857b3000 r8:8544652c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446500 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446500 r8:80287e08 r7:ec701e60 r6:85554900 r5:857b3000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec719fb0 to 0xec719ff8) 9fa0: 00000000 00000000 00000000 00000000 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8543d640 INFO: task kworker/0:806:5768 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a6918000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 r5:800f0113 r4:80239bb0 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 Not tainted 6.15.0-rc7-syzkaller #0 r4:00000000 [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r4:85446580 INFO: task kworker/0:807:5770 is blocked on a mutex likely owned by task kworker/0:174:3633. r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r4:00000000 r5:85845f8c r4:85845c00 r10:00000000 r9:85446600 r8:80287e08 r7:ec719e60 r6:85554a00 r5:857b6000 dd20: a6d6b000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:809:5774 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:809 state:D stack:0 pid:5774 tgid:5774 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec709d84 r8:00000002 r7:60000113 r6:ec709d8c r5:857b6c00 r4:857b6c00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:857b6c00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec709e08 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r5:85845b8c r4:85845800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85446680 r8:80287e08 r7:ec721e60 r6:85554a80 r5:857b6c00 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:84b4f38c r4:84b4f000 r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 INFO: task kworker/1:508:5776 blocked for more than 479 seconds. r4:857b4800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec715e08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r4:85554b00 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85554b00 r8:80287e08 r7:ec705e60 r6:85554b80 r5:857b4800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec715fb0 to 0xec715ff8) 5fa0: 00000000 00000000 00000000 00000000 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8544f740 INFO: task kworker/1:508:5776 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a71e8000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r4:e043ddc0 r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) INFO: task kworker/1:509:5779 blocked for more than 479 seconds. r4:85868000 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec72de08 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:857f0f8c r4:857f0c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:00000000 r9:85554c00 r8:80287e08 r7:ec715e60 r6:85554c80 r5:85868000 Exception stack(0xec72dfb0 to 0xec72dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84a2c5c0 INFO: task kworker/1:509:5779 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a71e8000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r4:84aecb80 r4:00000001 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred r5:85868c00 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584638c r4:85846000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r10:61c88647 r9:85868c00 r8:8544672c r7:82804d40 r6:dddced80 r5:dddceda0 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) task:kworker/0:811 state:D stack:0 pid:5782 tgid:5782 ppid:2 task_flags:0x4208060 flags:0x00000000 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8543dd40 INFO: task kworker/0:811:5782 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a79fc000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:812:5783 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:812 state:D stack:0 pid:5783 tgid:5783 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec73dd84 r8:00000002 r7:60000113 r6:ec73dd8c r5:8586b000 r4:8586b000 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586b000 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec73de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85458180 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586b000 r7:00000000 r6:83018000 r5:00001000 r4:7f049000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba1b000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:8584738c r4:85847000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:8584738c r4:85446800 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586b000 r8:8544682c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446800 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446800 r8:80287e08 r7:ec739e60 r6:85554e00 r5:8586b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec73dfb0 to 0xec73dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8543dd40 INFO: task kworker/0:812:5783 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Exception stack(0xe043dd28 to 0xe043dd70) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r5:84b4f38c r4:84b4f000 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:8586c800 r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec745e08 r9:83018005 r8:8586c800 r7:00000000 r6:83018000 r5:00001000 r4:7f045000 r5:85846b8c r4:85846800 r10:61c88647 r9:8586c800 r8:854468ac r7:82804d40 r6:dddced80 r5:dddceda0 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:82ac21e4 r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:814:5787 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:814 state:D stack:0 pid:5787 tgid:5787 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec74dd84 r8:00000002 r7:60000013 r6:ec74dd8c r5:85869800 r4:85869800 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:85869800 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec74de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85458040 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:85869800 r7:00000000 r6:83018000 r5:00001000 r4:7f047000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eb9e9000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85846f8c r4:85846c00 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85846f8c r4:85446900 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:85869800 r8:8544692c r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446900 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446900 r8:80287e08 r7:ec73de60 r6:85554f00 r5:85869800 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec74dfb0 to 0xec74dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85458080 task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 r4:82ac21e4 r4:e043ddc0 r5:00001000 r4:e0447000 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 dfa0: 00000000 00000000 00000000 00000000 Workqueue: events bpf_prog_free_deferred r5:8586d400 r4:8291a680 [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r7:dddced80 r6:83018000 r5:8584778c r4:85446980 r10:00000000 r9:85446980 r8:80287e08 r7:ec73de60 r6:85554f80 r5:8586d400 INFO: task kworker/0:815:5790 is blocked on a mutex likely owned by task kworker/0:174:3633. dd20: a8003000 e0435000 00000001 80239b98 7f4e1000 00000001 r4:e043ddc0 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 Workqueue: events bpf_prog_free_deferred [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85458540 r5:85847f8c r4:85847c00 r7:dddced80 r6:83018000 r5:85847f8c r4:85446a00 r4:00000001 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 Call trace: Exception stack(0xe043dd28 to 0xe043dd70) r4:82ac21e4 r4:00000000 r5:84b4f38c r4:84b4f000 r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:84b0e300 Future hung task reports are suppressed, see sysctl kernel.hung_task_warnings INFO: task kworker/0:817:5794 blocked for more than 479 seconds. Not tainted 6.15.0-rc7-syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:817 state:D stack:0 pid:5794 tgid:5794 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a541e8>] (__schedule_loop kernel/sched/core.c:6845 [inline]) [<81a53264>] (__schedule) from [<81a541e8>] (schedule+0x2c/0x130 kernel/sched/core.c:6860) r10:8291a684 r9:ec75dd84 r8:00000002 r7:60000013 r6:ec75dd8c r5:8586ec00 r4:8586ec00 [<81a541bc>] (schedule) from [<81a545d0>] (schedule_preempt_disabled+0x18/0x24 kernel/sched/core.c:6917) r5:8586ec00 r4:8291a680 [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock_common kernel/locking/mutex.c:678 [inline]) [<81a545b8>] (schedule_preempt_disabled) from [<81a56cb4>] (__mutex_lock.constprop.0+0x300/0x6f8 kernel/locking/mutex.c:746) [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ec75de08 r4:00000000 [<81a5716c>] (__mutex_lock_slowpath) from [<81a571c0>] (mutex_lock+0x3c/0x40 kernel/locking/mutex.c:277) [<81a57184>] (mutex_lock) from [<804e7848>] (_vm_unmap_aliases+0x68/0x240 mm/vmalloc.c:2860) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:85458480 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:8586ec00 r7:00000000 r6:83018000 r5:00001000 r4:7f04d000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:eba53000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:85847b8c r4:85847800 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:85847b8c r4:85446a80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:8586ec00 r8:85446aac r7:82804d40 r6:dddced80 r5:dddceda0 r4:85446a80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:85446a80 r8:80287e08 r7:ec759e60 r6:854b1080 r5:8586ec00 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xec75dfb0 to 0xec75dff8) dfa0: 00000000 00000000 00000000 00000000 dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:85458400 INFO: task kworker/0:817:5794 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a83ba000 e0435000 00000001 80239b98 7f4e1000 00000001 dd40: 82ac15a0 7f4e1000 e0435000 8280c928 82ac21c4 e043dda4 e043dda8 e043dd78 dd60: 80230ad0 80239bb0 800f0113 ffffffff r5:800f0113 r4:80239bb0 [<80230a6c>] (flush_tlb_kernel_range) from [<804e761c>] (__purge_vmap_area_lazy+0x210/0x3d4 mm/vmalloc.c:2284) r4:82ac21e4 [<804e740c>] (__purge_vmap_area_lazy) from [<804e79c4>] (_vm_unmap_aliases+0x1e4/0x240 mm/vmalloc.c:2899) r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r4:e043ddc0 [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vm_reset_perms mm/vmalloc.c:3294 [inline]) [<804e77e0>] (_vm_unmap_aliases) from [<804eb728>] (vfree+0x168/0x204 mm/vmalloc.c:3373) r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84b0e1c0 r4:00000000 [<804eb5c0>] (vfree) from [<8054b0fc>] (execmem_free+0x30/0x50 mm/execmem.c:431) r9:83018005 r8:84a4b000 r7:00000000 r6:83018000 r5:00001000 r4:7f0d7000 [<8054b0cc>] (execmem_free) from [<803cc268>] (bpf_jit_free_exec+0x10/0x14 kernel/bpf/core.c:1077) r5:00001000 r4:e0447000 [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_binary_free kernel/bpf/core.c:1123 [inline]) [<803cc258>] (bpf_jit_free_exec) from [<803cc648>] (bpf_jit_free+0x68/0xe4 kernel/bpf/core.c:1246) [<803cc5e0>] (bpf_jit_free) from [<803cd7a4>] (bpf_prog_free_deferred+0x14c/0x164 kernel/bpf/core.c:2886) r5:84b4f38c r4:84b4f000 [<803cd658>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4 kernel/workqueue.c:3238) r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137) Exception stack(0xe043dfb0 to 0xe043dff8) dfa0: 00000000 00000000 00000000 00000000 dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [<81a569b4>] (__mutex_lock.constprop.0) from [<81a57180>] (__mutex_lock_slowpath+0x14/0x18 kernel/locking/mutex.c:1033) r5:8584838c r4:85848000 r7:dddced80 r6:83018000 r5:8584838c r4:85446b00 r4:00000001 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef50 r4:854584c0 INFO: task kworker/0:818:5796 is blocked on a mutex likely owned by task kworker/0:174:3633. task:kworker/0:174 state:R running task stack:0 pid:3633 tgid:3633 ppid:2 task_flags:0x4208060 flags:0x00000000 Workqueue: events bpf_prog_free_deferred Call trace: [<81a53264>] (__schedule) from [<81a5461c>] (preempt_schedule_irq+0x40/0xa8 kernel/sched/core.c:7090) r10:82ac21c4 r9:84a4b000 r8:80200be4 r7:e043dd5c r6:ffffffff r5:84a4b000 r4:00000000 [<81a545dc>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) Exception stack(0xe043dd28 to 0xe043dd70) dd20: a8ae4000 e0435000 00000001 80239b98 7f4e1000 00000001 r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:e043ddc0 r5:e043de08 r7:dddced80 r6:83018000 r5:84b4f38c r4:84aecb80 [<80287208>] (process_one_work) from [<80288004>] (process_scheduled_works kernel/workqueue.c:3319 [inline]) [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8 kernel/workqueue.c:3400) r10:61c88647 r9:84a4b000 r8:84aecbac r7:82804d40 r6:dddced80 r5:dddceda0 r4:84aecb80 [<80287e08>] (worker_thread) from [<8028f07c>] (kthread+0x12c/0x280 kernel/kthread.c:464) r10:00000000 r9:84aecb80 r8:80287e08 r7:e0431e60 r6:84aecc00 r5:84a4b000 r4:00000001 [<8028ef50>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20 arch/arm/kernel/entry-common.S:137)